Articles Blog | G5 Cyber Security

Research – Router Exploitation

This is a presentation called Router Exploitation. It was given at BlackHat 2009. It discusses various vendors such as Cisco, Juniper, Huawei, and more.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/118328/FX_Router_Exploitation.pdf

Source: https://packetstormsecurity.com/files/118328/Router-Exploitation.html

Exit mobile version