Discover Vendors/Products News
Exploiting Cisco Routers: Part 2
As imagined, router config files can give the penetration tester a TON of useful information. One can identify new targets, identify sensitive systems or networks by analyzing the ACLs, learn passwords that may be used elsewhere, and a bunch of other information.
The link for this article located at SecurityFocus is no longer available.