Hacking Routers, Cable Modems and Firewalls

8 Steps to Protect Your Cisco Router

Hacking Routers, Cable Modems and Firewalls Internet Security Whitepapers

Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Honeypots are modifying the way people think about security. Companies are spending thousand of dollars on new security devices, but forgetting the basic, the first line of defense: the border router. In this article it will give you 8 steps, easy to follow, to minimize your Cisco router exposure by turning off some unused services, applying some access control and applying some security options available on that.

Building a Console Cable

Hacking Routers, Cable Modems and Firewalls Internet Security Whitepapers

Many embedded devices (such as switches, routers, cable modems, and so on) have an internal communication port known as a console port. This type of port is typically used for configuring the device and issuing commands with root-level access. If the device is offline, this port can also be used to reconfigure the device locally. However, if it is online, other administration protocols can also be used, such as telnet or rlogin.

Cisco Router Guide

Hacking Routers, Cable Modems and Firewalls Internet Security Whitepapers

This guide shows how Cisco Access Routers, Cisco Aggregation Routers, and Cisco Integrated Services Routers enable you to meet your current and future needs with modular designs, allowing incremental migration as your business and network requirements change. In this guide, you can see for yourself how Cisco delivers benefits beyond basic data access, providing services such as voice, security, and wireless as part of an integrated routing system that maximizes productivity and investment protection.

Cisco Router Security Best Practices

Hacking Routers, Cable Modems and Firewalls Internet Security Whitepapers

This document provides Guideline for securing a typical enterprice perimeter (Gateway) router. Security issues related to routing protocols (BGP, OSPF, RIP, VRRP) are beyond the scope of this document.

Cisco Routers as Targets

Hacking Routers, Cable Modems and Firewalls Internet Security Whitepapers

Why we need to protect router resources? Often the "heart" of the network; Gaining a lot more attention from attackers; Few procedures on hardening Cisco routers; Routers are much slower to get upgraded to solve security bugs; Many ISP's are still running custom code from Cisco for older 10.X and 11.X trains; Few people monitor their configurations regularly; Few security measures in place; There are millions of them.

Exploiting Cisco Systems

Hacking Routers, Cable Modems and Firewalls Internet Security Whitepapers

This tutorial is just something to use for educational purposes. Only use this information in a legal way (the hacker wargames for instance), and do not damage or destroy anything. This is a step-by-step guide on how a series of proven cisco exploits can be used to gain access. If you get caught breaking into a cisco router, or screw the system up, you can interrupt hundreds of internet clients, and cost thousands of dollars, so only use this when you are allowed! Using this the wrong way will get you into a lot of trouble.

Hacking Exposed: Firewalls

Hacking Routers, Cable Modems and Firewalls Internet Security Whitepapers

Two types of fi rewalls dominate the market today: application proxies and packet-fi ltering gateways (and some hybrid combination of both). Although application proxies are widely considered more secure than packet-fi ltering gateways, their restrictive nature and performance limitations have constrained their adoption to primarily internal company traffi c going out rather than traffi c inbound to a company’s web server or DMZ. On the other hand, packet-fi ltering gateways, or the more sophisticated stateful packet-fi ltering gateways, can be found in many larger organizations with high-performance inbound and outbound traffi c requirements.

SolarWinds Toolset Administrator Guide

Hacking Routers, Cable Modems and Firewalls Internet Security Whitepapers Scanning

The SolarWinds Toolset provides the tools you need as a network engineer or network consultant to get your job done. Toolset includes best-of-breed solutions that work simply and precisely, providing the diagnostic, performance, and bandwidth measurements you want, without extraneous, unnecessary features. SolarWinds was founded by network professionals and continues to design tools for the network professional by listening to and enlisting the help of network professionals. This document contains information for the tools contained in all toolset editions.

SolarWinds Toolset Quick Start Guide

Hacking Routers, Cable Modems and Firewalls Internet Security Whitepapers Scanning

SolarWinds Toolsets contain desktop applications ranging from configuration management, bandwidth and network performance monitoring to discovery and fault management. The size and complexity of your network will determine which Toolset solution that best meets your needs.