Jump to content

Router Exploitation


herakty

Recommended Posts

Os routers são como os centros de controle da estrutura de redes e com o encolher de remote exploits de outros serviços expostos para fora, voltou-se a falar a fundo deste tema e houve uma execelente apresentação no ultimo black hat e apresento aqui

http://www.blackhat.com/presentations/bh-usa-09/LINDNER/BHUSA09-Lindner-RouterExploit-SLIDES.pdf

a CISCO tips criou esta secção de contra medidas para a apresentação apresentada

http://www.cisco-tips.com/blackhat-2009-router-exploitation-presentation/

teckV

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site you accept our Terms of Use and Privacy Policy. We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.