Previously, we saw how to exploit routing protocols. Now it is time to learn how to exploit modern routers.
Exploiting routers
Router components
Like every major networking device, a router is composed of many internal components:
- CPU: Executes system operations
- RAM: Used to store instructions
- ROM: Contains boot instructions
- Flash: Contains the IOS
- NVRAM: Contains the startup configuration file:
Router bootup process
To boot up, every major router goes through multiple steps:
- First, the router performs a POST.
- It loads the bootstrap.
- It locates and loads the operating...