Network Security. Objectives. Types of Attacks Attacks on the OSI & TCP/IP Model Attack Methods Prevention Switch Vulnerabilities and Hacking Cisco Routers Interesting links. Physical Access Attacks Wiretapping Server Hacking Vandalism. Dialog Attacks Eavesdropping Impersonation
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Provides a strong degree of protection from the outside world.
Can be effective with little or no setup
Can protect multiple systems
Better suite to protect against Trojans and worms.
Allows you to configure the ports you wish to monitor. It gives you more fine control.
Protects a single system.Firewalls (Cont.)
Spanning Tree Attacks (Cont.)
Virtual connection 1
Virtual Connection 2
Cisco uBR10012 series devices automatically enable SNMP read/write access
Since there are no access restrictions on this community string , attackers can exploit this to gain complete control of the device
By sending an SNMP set request with a spoofed source IP address the attacker will be able to get the Victim router to send him its configuration file.
With this information, the remote computer will be able to have complete control over this router
Fixes- Software updates available on the CICSO site that will fix the Read/Write problem
Thank You !