Routers are the major devices in every modern organization. In a connected world, routing is the backbone of exchanging information, and we know that valuable information is a target for attackers on a daily basis. This chapter will take you through a learning experience that begins by exploring routing operations and guides you through real-world demonstrations of exploiting routing protocols and routers.
In this chapter, you will discover the following:
- Routing fundamentals
- Exploiting routing protocols—RIP, OSPF, EIGRP, and BGP
- Exploiting modern routers
- How to defend against level 3 attacks