Lucene search

K
myhack58佚名MYHACK58:62200922531
HistoryMar 15, 2009 - 12:00 a.m.

Penetration of the underlying routing techniques-vulnerability warning-the black bar safety net

2009-03-1500:00:00
佚名
www.myhack58.com
6

Source: Huaxia hacking Union

Master scan the underlying routing can greatly facilitate invasion within the network,such as enterprise,company,school, etc…if thorough techniques can intercept sensitive information,simplifying the invasion process,and obtain a routing privilege,it can be prepared for the agent to springboard, imitation pseudo-attacks, etc. You can say that this is a"high level"of hacking techniques.
First of all,we have to prepare something - “the SolarWinds. Engineers. Toolset”

[! [1.jpg

Size: 33.17 K
Size: 5 0 0 x 3 5 6
Viewed: 2 times
Click to open a new window to browse the full map](/Article/UploadPic/2009-3/200931615920959.jpg)](<http://www.sai52.com/attachment.php?id=1721&gt;)

We are the first to open thecisco Tools in the"IP Network browser"of the input we want to scan the IP segment, to determine whether a vulnerability was

[! [2.jpg

Size: 11.07 K
Size: 5 0 0 x 8 6
Viewed: 1 times
Click to open a new window to browse the full map](/Article/UploadPic/2009-3/200931615921128.jpg)](<http://www.sai52.com/attachment.php?id=1722&gt;)

If the scan comes out, it will display a special sign.

[! [3.jpg

Size: 31.58 K
Size: 5 0 0 x 3 0 4
Browse: 0 times
Click to open a new window to browse the full map](/Article/UploadPic/2009-3/200931615921655.jpg)](<http://www.sai52.com/attachment.php?id=1723&gt;)

The scan came out, we want to use CISCOTools the ConfigDownload to download the routing config file

[! [4.jpg

Size: 4.01 K
Size: 1 8 4 x 9 5
Viewed: 1 times
Click to open a new window to browse the full map](/Article/UploadPic/2009-3/200931615922894.jpg)](<http://www.sai52.com/attachment.php?id=1724&gt;)

After the point, we find SelectRouter, fill in the better we scan out the IP

[! [5.jpg

Size: 15.78 K
Size: 3 5 0 x 2 3 8
Viewed: 1 times
Click to open a new window to browse the full map](/Article/UploadPic/2009-3/200931615922921.jpg)](<http://www.sai52.com/attachment.php?id=1725&gt;)

After the download, is generally stored in c:\tftp-root directory, give the file the

[! [6.jpg

Size: 74.41 K
Size: 3 4 6 x 5 0 0
Viewed: 2 times
Click to open a new window to browse the full map](/Article/UploadPic/2009-3/200931615923679.jpg)](<http://www.sai52.com/attachment.php?id=1726&gt;)

Summary: The administrator wants to regularly modify Secret password,and the plaintext and ciphertext password to distinguish. And master the latest kinds of vulnerabilities, to update the check.