Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense
Chapter 13
Protecting Networks with Security Devices
Router
Understanding Routers
He presented a major
Cisco security
vulnerability at the
Black Hat security
conference in 2005
He lost his job, was
sued, conference
materials were
confiscated, etc.
– See links Ch 13 d, e, f, g
Cisco IOS is
controlled from the
command line
The details are not
included in this
class
Skip pages 324-
329
Understanding Firewalls
Router providing
NAT and PAT