Using a Compromised Router to Capture Network Traffic - This document details the approach, methodology and results of a recent experiment using GRE tunnels to sniff all traffic passing through a Cisco router.
cde9ed24f2abf6cc7625477e61b850179dd4e9a0d79c528f6d47e6637dddad12
Securing IGS Cisco Routers v1.00 - This paper will describe how you should obtain remote and local, information about an IGS Cisco Router. After we have collected some information that is useful to us, we'll try to secure the router as much as possible.
562e7903c6f08e878af7573561022cf9f8609367a50b3705518f6e6ab89765f3