(In the ever-increasing network, the Web is blooming with bright colors, e-mails, voice calls, web conferences, file transfers, all kinds of data are intertwined, forming a glorious digital world. At the bottom of the noisy digital world, there is a delicate order, which determines the functions of data routing, heterogeneous media connection, and protocol interaction. And the builder of this order is the router that is covered with the comprehensive network. Therefore, the router has become a traffic kiosk for data communication, and it has also become one of the schemes that many black hats compete for. Cisco routers occupy a certain place in the networked world, so the security focus effect inspires the sophisticated art of routing intrusion/intrusion and prevention. Below I will describe Cisco's intrusion/intrusion methods and protection strategies from the shallower to the deeper. [Router cold] The router is not a powerful system from its own IOS, so it will occasionally make itself cold and fever. When the system has a cold and fever, the resistance naturally drops a lot.
IOS itself deceives Cisco routers by using the IOS system to realize the detailed functions of routing, so it is the soul of the routing system. The online system approach of the Show command opens a door to peeping. As we all know, in Cisco routers, usually users can only detect very little information about the router. Users who can enter privileged mode are only eligible to detect comprehensive information and repair routes. In normal mode, show's online help system does not list all available commands, although the 75 extended parameters of show can only be used in privileged mode (enable), in fact only 13 are limited. This means that normal users (unprivileged users) can check access lists or other routing security related information.
Cisco Router Intrusion/Intrusion.pdf)