The following are resources that can be used to gain more knowledge on the topics covered in this chapter:
- 73% of companies using vulnerable end-of-life networking devices: https://www.csoonline.com/article/3124937/networking/73-of-companies-using-vulnerable-end-of-life-networking-devices.html
- Vulnerable Network Devices: A Growing Concern: https://www.acunetix.com/blog/articles/vulnerable-network-devices-growing-concern/
- Bypassing Captcha Like a Boss: https://medium.com/bugbountywriteup/bypassing-captcha-like-a-boss-d0edcc3a1c1
- Bypassing hardware firewalls in 20 seconds: https://www.csoonline.com/article/2601300/microsoft-subnet/bypassing-hardware-firewalls-in-20-seconds.html