Hacking Cisco Networks

download Hacking Cisco Networks

of 9

Transcript of Hacking Cisco Networks

  • 8/6/2019 Hacking Cisco Networks

    1/9

    Hyqfdb|bme Nb~nd ^~|hg~

    Ucrmbme;LD MD\ x~h |ib~ |d lcgceh nb~nd ~~|hg~& dr ecbm xmcx|idrb{hl cnnh~~ |d ~~|hg~-\ib~ |x|drbcf b~ kx~| ~dgh|ibme |d x~h jdr hlxnc|bdmcf qxrqd~h~- Dmf x~h |ib~bmjdrgc|bdm bm c fhecf uc )|ih icn`hr ucrecgh~ jdr bm~|cmnh"& cml ld md| lcgcehdr lh~|rd cm|ibme- \ib~ b~ c ~|hq'o'~|hq exblh dm idu c ~hrbh~ dj qrdzhm nb~

    nd hyqfdb|~ ncm oh x~hl |d ecbm cnnh~~- Bj dx eh| ncxei| orhc`bme bm|d c nb~ndrdx|hr& dr ~nrhu |ih ~~|hg xq& dx ncm bm|hrrxq| ixmlrhl~ dj bm|hrmh| nfbhm|~&cml nd~| |idx~cml~ dj ldffcr~& ~d dmf x~h |ib~ uihm dx crh cffduhl## X~bme |ib~ |ih urdme uc ubff eh| dx bm|d c fd| dj |rdxofh-

    Md|h; ~dgh dj |ib~ |x|drbcf uc~ urb||hm dm c Xmby ~~|hg& cml |ih |hy| uc~ md| ndmzhr|hl |d oh LD^ $Ubmldu~'ndgqc|bofh& ~d dx%ff iczh |d zbhu |ib~ |hy| jrdg hb|ihr dxr Bm|hrmh| ordu~hr& dr jrdg cm clzcmnhl hlb|dr ~xni c~ Gbnrd~dj| Udrl-

    ''''''''''''''''''''''''''''''''''\cofh dj Ndm|hm|~;''''''''''''''''''''''''''''''''''

    Ohjdrh dx ~|cr|;

    ' Uic| b~ cm BQ cllrh~~4

    ' Uic| b~ cm B^Q4

    ' Uic| b~ c \NQ$BQ qcn`h|4

    ' Idu |d ~qddj dxr BQ

    ' Idu |d x~h \hfmh|

    ' Idu |d x~h Iqhr\hrgbmcf

    ' Idu |d x~h Qbme

    ' Idu |d x~h \rcnh_dx|h

    ' Idu |d x~h c qrdy ~hrzhr

    '''''''''''''''''''''''''''''''''''''

    ' ^hn|bdm 3; ui icn` c nb~nd rdx|hr4

    ' ^hn|bdm ?; idu |d jbml c nb~nd rdx|hr

    ' ^hn|bdm >; idu |d orhc` bm|d c nb~nd

    ' ^hn|bdm

  • 8/6/2019 Hacking Cisco Networks

    2/9

    m|bj ndgqx|hr~ |ic| ndmmhn| |d |ihg- \ib~ b~ idu dx ncm oh ocmmhl jrdg B_N& cml idu |ih ncm jbml dxr B^Q- BQ cllrh~~h~ crh hc~bf do|cbmhl& |ih ncm oh rh|rbhzhl |irdxei |ih jdffdubme gh|idl~;

    'dx ed |d c uho~b|h& dxr BQ b~ fdeehl

    'dm B_N& cmdmh ncm eh| dxr BQ

    'dm BNS& qhdqfh ncm eh| dxr BQ& hzhm bj dx iczh |ih dq|bdm ~h| /ld md| ~idu bq/|ih ncm ~|bff eh| b|

    'bj dx crh ndmmhn|hl |d ~dghdmh& |ih ncm |qh /~~|c|/& cml ~hh uid b~ ndmmhn|hl |d |ihg

    'bj ~dghdmh ~hml~ dx cm hgcbf ub|i BQ'fdeebme kczc& |ih ncm cf~d eh| dxr BQ cllrh~~

    \ihrh crh gcm gdrh uc~ dj do|cbmbme BQ cllrh~~h~& bmnfxlbme x~bme ocn`'lddr qr

    dercg~ ~xni c~ ^xo5 dr Mh|Ox~-

    ''''''''''''''''''''''''''''''''''''

    Uic| b~ cm B^Q4

    B^Q ~|cml~ jdr Bm|hrmh| ^hrzbnh Qrdzblhr& |ih crh |ih dmh~ |ic| ebzh dx |ih bm|hrmh|- Rdx ndmmhn| |d dmh hzhr|bgh dx lbcf'xq cml gc`h c ndmmhn|bdm- Qhdqfh ncm jbml dxr B^Q ~bgqf o rxmmbme c |rcnhrdx|h dm dx )|rcnhrdx|h b~ fc|hr hyqfcbmhl"- B| ubff fdd` ~dgh|ibme fb`h |ib~;

    |rcnhr| ???-???-??-??

    \rcnbme rdx|h |d P??3-??>-?g~ b~q-jbrhucff P???-???-??-?1W> 38:g~ 3>g~ 3g~ 31?g~ ~dgh|ibme-bq P333-33-33-33W5 ???g~ 3?>g~ ?3>g~ mh|ndg-ndg P3??-33-?3-?3W9 38?g~ ?33g~ ?3?g~ ofciofci-||~-mh| P3?3-?3-?3->>W2 3??g~ ??>g~ ?g~ cf|czb~|c->?-W 666 |creh|%~ b~q31 313g~ 3??g~ 3>?g~ ??3-??>-?

  • 8/6/2019 Hacking Cisco Networks

    3/9

    ''''''''''''''''''''''''''''''''''''

    Idu |d ~qddj dxr BQ;

    Jbml c qrdercg fb`h Ehmbx~ ? dr LN B^& uibni ubff fh| dx rxm Blhm|L- \ib~ ubfffh| dx nicmeh qcr| dj dxr ndgqx|hr%~ blhm|b| c| ubff# X~h |ib~ uihm dx eh| o

    cmmhl jrdg ~dgh B_N nic| rddg---- dx ncm eh| rbei| ocn` bm# Rdx ncm cf~d x~h b|uihm dx crh cnnh~~bme cmd|ihr ~~|hg& ~d b| fde~ |ih urdme bl---

    ''''''''''''''''''''''''''''''''''''

    Idu |d x~h |hfmh|;

    Rdx ncm dqhm |hfmh| ~bgqf o edbme |d dxr ^|cr| Ghmx& |ihm |d _xm& cml |qbmebm /|hfmh|/- Dmnh dx iczh dqhmhl |hfmh|& dx gc ucm| |d nicmeh ~dgh jhc|xrh~-Nfbn` dm \hrgbmcf=Qrhjhrhmnh~- Ihrh dx ncm nicmeh |ih oxjjhr ~b{h& jdm|& cml d|ihr |ibme~- Rdx ncm cf~d |xrm dm$djj /fdncf hnid/& bj dx |xrm fdncf hnid dm& dxr ndgqx|hr ubff ~idu dx hzhr|ibme dx |qh& cml |ih d|ihr ndgqx|hr dx crh nd

    mmhn|hl |d ubff ~idu dx c~ uhff- ^d dx gc eh| ~dgh|ibme fb`h |ib~0

    Rdx |qh /ihffd/& cml dx eh|iihfhfdffd

    \ib~ b~ ohncx~h |ih bmjdrgc|bdm ic~ odxmnhl ocn` cml ed| ~nrcgofhl ub|i uic| dx|qhl- \ih dmf rhc~dm B udxfl x~h |ib~ b~ bj |ih gcnibmh ldh~ MD\ rh|xrm uic|dx crh |qbme-

    O lhjcxf|& |hfmh| ubff ndmmhn| |d c ~~|hg dm |ih |hfmh| qdr|& uibni b~ qdr| ?>- Mdu dx ubff md| cfuc~ ucm| |d ndmmhn| |d qdr| ?>& ~d uihm dx ed |d ndmmhn|&dx ncm nicmeh |ih qdr| |d gcoh ?8& uibni b~ |ih qdr| jdr gcbf ~hrzhr~- Dr gcoh qdr| ?3& jdr J\Q- \ihrh crh |idx~cml~ dj qdr|~& ~d gc`h ~xrh dx qbn` |ih rbe

    i| dmh#

    ''''''''''''''''''''''''''''''''''

    Idu |d x~h Iqhr\hrgbmcf;

    Iqhr\hrgbmcf cffdu~ dx |d dqhm c /~hrzhr/ dm cm qdr| dj dxr ndgqx|hr |d fb~|hm jdr bmndgbme bmjdrgc|bdm jrdg ~qhnbjbhl ndgqx|hr~- \d x~h |ib~& ed |d ^|cr|=Qrdercg~=Cnnh~~drbh~=Ndggxmbnc|bdm~=Iqhr\hrgbmcf- Jbr~| dx ubff mhhl |d ~hfhn||ih ndmmhn|bdm& qbn` /\NQ$BQ Ubm~dn`/& cml |ihm qx| bm |ih ndgqx|hr |d ndggxmbnc|h ub|i& cml |ih qdr| .- Rdx ncm |hff b| |d fb~|hm jdr bmqx| o edbme |d Ncff=Ucb| jdr Ncff- Mdu |ih d|ihr ndgqx|hr ncm ndmmhn| |d dx dm |ic| qdr|& cml dx ncmnic| cml |rcm~jhr jbfh~-

    ''''''''''''''''''''''''''''''''''

    Idu |d x~h Qbme;

    Qbme b~ hc~& kx~| dqhm |ih G^'LD^ qrdgq|& cml |qh /qbme bq-cllrh~~/& o lhjcxf| b| ubff qbme > |bgh~& ox| dx ncm |qh /qbme bq-cllrh~~ '|/ Uibni ubff gc`h b|qbme jdrhzhr- \d nicmeh |ih qbme ~b{h ld |ib~; /qbme 'f )~b{h"bq-cllrh~~/ Uic|qbme ldh~ b~ ~hml c qcn`h| dj lc|c |d c ndgqx|hr& |ihm ~hh~ idu fdme b| |c`h~ |d oh rh|xrmhl& uibni lh|hrgbmh~ |ih ndgqx|hr%~ ndmmhn|bdm ~qhhl& cml |ih |bgh |ic| b| |c`h~ jdr c qcn`h| |d ed ocn` cml jdr|i )|ib~ b~ ncffhl |ih /|rbq |bgh/"-Qbme ncm cf~d oh x~hl |d ~fdu ldum dr hzhm nrc~i c ~~|hg bj |ih ~~|hg b~ dzhrf

    dclhl o qbme jfddl~- Ubmldu~ 29 nrc~ih~ cj|hr dmh gbmx|h dj qbmejfddlbme )b|%~ndmmhn|bdm~ oxjjhr b~ dzhrjfdum ' |dd gcm ndmmhn|bdm~ crh rheb~|hrhl& cml ~d Ubmldu~ lhnblh~ |d |c`h c fb||fh zcnc|bdm"- C qbme jfddl c||cn` |c`h~ c fd| dj ocm

  • 8/6/2019 Hacking Cisco Networks

    4/9

    lubl|i jrdg dx& cml dx gx~| iczh gdrh ocmlubl|i |icm dxr |creh| )xmfh~~ |ih |creh| b~ c Ubmldu~ 29 ody cml dx iczh cm czhrceh gdlhg& |ic| uc dx%ff `mdn` b| ldum cj|hr cqqrdybgc|hf c ~bmefh gbmx|h dj qbme jfddlbme"- Qbme jfddlbme b~m%| hjjhn|bzh cecbm~| ~|rdmehr |creh|~& xmfh~~ dx iczh sxb|h c jhu hzbf fbmh~ |ddxr~hfj& cml dx iczh ndm|rdf dzhr c jhu ocmlubl|i'~ccz id~|~ |ic| ncm qbme jfddl dxr |creh| c~ uhff- Md|h; LD^%~ '| dq|bdm ldh~m%| ld c qbme jfddl& b| kx~|qbme~ |ih |creh| ndm|bmdx~f& ub|i bm|hrzcf~ jrdg dmh qbme |d cmd|ihr- Bm hzhr

    Xmby dr Fbmxy lb~|rbox|bdm& dx ncm x~h qbme 'j |d ld c rhcf qbmejfddl- Cn|xcffqbme 'j b~ rhsxbrhl bj dx ucm| dxr lb~|rbox|bdm |d oh QD^BY'ndgqfbcm| )QD^BY' Qdr|cofh Dqhrc|bme ^~|hg Bm|hrjcnh oc~hl dm xmbY"& d|ihrub~h b|%~ md| c rhcfXmby$Fbmxy lb~|rbox|bdm& ~d bj dx iczh cm D^ |ic| ncff~ b|~hfj hb|ihr Xmby dr Fbmxy& b| ic~ |ih 'j ~ub|ni-

    ''''''''''''''''''''''''''''''''''

    Idu |d x~h \rcnh_dx|h;

    \d |rcnh dxr ndmmhn|bdm )cml ~hh cff |ih ndgqx|hr%~ oh|uhhm dx cml c |creh|"&kx~| dqhm |ih G^'LD^ qrdgq|& cml |qh /|rcnhr| bq-cllrh~~/ cml dx ubff ~hh c fb

    ~| dj ndgqx|hr~& uibni crh oh|uhhm dx cml |ih |creh| ndgqx|hr- Rdx ncm x~h |ib~|d lh|hrgbmh bj |ihrh crh jbrhucff~ ofdn`bme cm|ibme- Cml ubff cf~d cffdu dx|d lh|hrgbmh~dghdmh%~ B^Q )bm|hrmh| ~hrzbnh qrdzblhr"-

    \d lh|hrgbmh |ih B^Q& ~bgqfh fdd` c| |ih BQ cllrh~~ ohjdrh |ih fc~| dmh& |ib~ ~idxfl oh dmh dj |ih B^Q%~ rdx|hr~-

    Oc~bncff& |ib~ b~ idu |rcnhrdx|h udr`~ ' c \NQ$BQ qcn`h| ic~ c zcfxh bm b|%~ ihclhr )b|%~ bm |ih BQ ihclhr- Bj dxldm%| `mdu uic| |ib~ ghcm~& |ihm bemdrh b| cml ndm|bmxh rhclbme& b|%~ md| |ic| nrxnbcf" ncffhl \\F& uibni ~|cml~ jdr \bgh \d Fbzh- Uihmhzhr c qcn`h| idq~ )|rczhf~ |irdxei c rdx|hr" b|%~ \\F zcfxh b~ lhnrhc~hl o dmh- \ib~ b~ kx~| c ndxm|hrg

    hc~xrh cecbm~| |ih qd~~bobfb| |ic| ~dgh|ibme udxfl ed urdme cml c qcn`h| udxflrbndnih| cff crdxml |ih mh|& |ix~ uc~|bme ocmlubl|i- ^d uihm c qcn`h|%~ \\F rhcnih~ {hrd& b| lbh~ cml cm BNGQ hrrdr b~ ~hm| ocn` |d |ih ~hmlhr- Mdu& |rcnhrdx|hjbr~| ~hml~ c qcn`h| ub|i c \\F zcfxh dj 3- \ih qcn`h| sxbn`f rh|xrm~& cml o fdd`bme c| |ih ~hmlhr%~ cllrh~~ bm |ih BNGQ hrrdr%~ ihclhr& |ih |rcnhrdx|h `mdu~uihrh |ih qcn`h| ic~ ohhm bm b|%~ jbr~| idq- \ihm b| ~hml~ c qcn`h| ub|i c \\F zcfxh dj ?& cml b| rh|xrm~ cj|hr |ih ~hndml idq& rhzhcfbme b|%~ blhm|b|- \ib~ edh~ dm xm|bf |ih qcn`h| rhcnih~ b|%~ lh~|bmc|bdm-

    Mdu b~m%| |ic| jxm4 ;'"

    ''''''''''''''''''''''''''''''''''

    Idu |d x~h c qrdy ~hrzhr;

    Ld c ~hcrni dm |ih uho jdr c qrdy ~hrzhr uibni rxm~ dm |ih qdr| dj dxr nidbnh-Dmnh dx jbml dmh& ndmmhn| |d b| ub|i hb|ihr |hfmh| dr iqhr|hrgbmcf cml |ihm ndmmhn| |d cmd|ihr ndgqx|hr |irdxei |ih qrdy ~hrzhr- \ib~ uc |ih ndgqx|hr c| |ih d|ihr hml ubff md| `mdu dxr BQ cllrh~~-

    ''''''''''''''''''''''''''''''''''

    ^hn|bdm 3; ui icn` c nb~nd rdx|hr4

    Rdx qrdocof crh udmlhrbme-- ui icn` bm|d c nb~nd rdx|hr4

    \ih rhc~dm ohbme b~ |ic| |ih crh x~hjxf uihm b| ndgh~ |d orhc`bme bm|d d|ihr ~~|hg~---

  • 8/6/2019 Hacking Cisco Networks

    5/9

    Nb~nd rdx|hr~ crh zhr jc~|& ~dgh ub|i 39 \3 ndmmhn|bdm~ dm dmh ~~|hg& cml |ihcrh zhr jfhybofh cml ncm oh x~hl bm Ld^ c||cn`~ dr |d icn` d|ihr ~~|hg~ ~bmnhgd~| dj |ihg rxm |hfmh|-

    \ih cf~d iczh |idx~cml~ dj qcn`h|~ edbme |irdxei |ihg c| cm dmh |bgh& uibni ncm oh ncq|xrhl cml lhndlhl--- C fd| dj nb~nd rdx|hr~ crh cf~d |rx~|hl ~~|hg~& cm

    l ubff fh| dx iczh c nhr|cbm cgdxm| dj cnnh~~ |d d|ihr ndgqx|hr~ dm b|%~ mh|udr`-

    ''''''''''''''''''''''''''''''''''

    ^hn|bdm ?; jbmlbme c nb~nd rdx|hr

    Jbmlbme c nb~nd rdx|hr b~ c jcbrf hc~ |c~`& cfgd~| hzhr B^Q ubff rdx|h |irdxei c| fhc~| dmh nb~nd rdx|hr- \ih hc~bh~| uc |d jbml c nb~nd rdx|hr b~ |d rxm c|rcnhrdx|h jrdg ld~ )|qh /|rcnhr|/ cml |ihm |ih BQ cllrh~~ dj cmdmh%~ ndgqx|hr"& dx ncm |rcnh qrh|| gxni cmdmh ohncx~h |ih |rcnh ubff ~idu cff dj |ih ndgqx|hr ~~|hg~ oh|uhhm dxr ndgqx|hr cml |ihbr ndgqx|hr- Dmh dj |ih~h ~~|hg~ ubff

    qrdocof iczh |ih mcgh /nb~nd/ bm b|%~ mcgh- Bj dx jbml dmh fb`h |ib~& ndq ldum b|%~ BQ cllrh~~-

    Mdu dx iczh |ih fdnc|bdm dj c nb~nd rdx|hr& ox| b| gc iczh c jbrhucff qrd|hn|bme b|& ~d dx ~idxfl ~hh bj b|%~ ohbme ofdn`hl o qbmebme b| c ndxqfh |bgh~& bjdx eh| |ih qbme rh|xrmhl |d dx& b| gbei| md| oh ofdn`hl- Cmd|ihr c b~ |d |r|d cnnh~~ ~dgh dj |ih nb~nd rdx|hr%~ qdr|~& dx ncm ld |ib~ ~bgqf o x~bme |hfmh|& cml dqhmbme c ndmmhn|bdm |d |ih rdx|hr dm qdr| ?>-- Bj b| c~`~ jdr c qc~~udrl& ox| md x~hrmcgh& dx crh c| |ih rdx|hr& ox| bj b| ucm|~ c x~hrmcgh c~uhff& dx crh qrdocof c| c jbrhucff-

    \r |d jbml c rdx|hr ub|idx| c jbrhucff& ~bmnh |ib~ |x|drbcf b~ dm |ih rdx|hr~ cml md| idu |d eh| qc~| |ih jbrhucff~- Dmnh dx%rh ~xrh dx iczh jdxml c eddl ~~

    |hg& dx ~idxfl jbml c qrdy ~hrzhr uibni ubff cffdu dx |d x~h qdr| ?>& |ib~ uc dxr BQ ubff md| oh fdeehl o |ih rdx|hr-

    '''''''''''''''''''''''''''''''''

    ^hn|bdm >; idu |d orhc` bm|d c nb~nd rdx|hr

    Nb~nd rdx|hr~ rxmmbme z

  • 8/6/2019 Hacking Cisco Networks

    6/9

    |ih rdx|hr%~ qc~~udrl& cml uibfh b| b~ |hgqdrcrbf lb~cofhl& b| ubff rhzhr| |d b|%~ lhjcxf| ~|c|h-

    Mdu |ic| dx iczh fdeehl bm& dx gx~| cnsxbrh |ih qc~~udrl jbfh# \ih ~~|hg~ rxmlbjjhrhm| ~dj|ucrh& ox| gd~| ubff iczh c qrdgq| fb`h /i|f'|hy|bf/ dr ~dgh|ibme&mdu |qh /4/ jdr c fb~| dj ndggcml~& dx ubff ~hh c ixeh fb~| dj ndggcml~& ~dghuihrh bm |ihrh dx ubff jbml c |rcm~jhr ndggcml& x~h |ic| |d eh| |ih qc~~udrl jb

    fh dj clgbm )uibni b~ |ih nxrrhm| x~hr" cml ~hml b| |d dxr dum BQ cllrh~~ dm qdr| ?>- Ox| ohjdrh dx ld |ib~& ~h| xq Iqhr\hrgbmcf |d ucb| jdr c ncff jrdg |ihnb~nd rdx|hr- Mdu dmnh dx ~hml |ih jbfh& Iqhr\hrgbmcf ubff c~` dx bj dx ucm| |d cnnhq| |ih jbfh |ic| |ib~ gcnibmh b~ ~hmlbme dx& ~c h~ cml ~czh b| |d lb~`- Fdedx|-

    Rdx crh mdu qc~| |ih icrlh~| qcr|& ebzh dxr~hfj c qc| dm |ih ocn` cml eh| rhcl|d orhc` |ic| qc~~udrl#

    ''''''''''''''''''''''''''''''

    ^hn|bdm

  • 8/6/2019 Hacking Cisco Networks

    7/9

    jdr )b 7 ? 0 b 67 ~|rfhm)hmnTqu"0 b" pbj)b #7? ** #)b * 3"" plhnTquPb $ ? ' ?W 7 zcf ] yfc|P~hhlW0zcf 7 10w

    zcf +7 3:0

    bj)b~lbeb|)hmnTquPbW 7 |dxqqhr)hmnTquPbW""" pzcf 7 hmnTquPbW ' %1%0ndm|bmxh0w

    bj)hmnTquPbW =7 %C% ** hmnTquPbW 67 %J%" pzcf 7 hmnTquPbW ' %C% 310ndm|bmxh0w

    bj)~|rfhm)hmnTqu" #7 b"rh|xrm)'3"0w

    lhnTquPb $ ?W 7 10

    rh|xrm)1"0w

    x~ceh)"pjqrbm|j)~|ldx|& /X~ceh; (~ 'q 6hmnrq|hl qc~~udrl=Vm/& qmcgh"0jqrbm|j)~|ldx|& / (~ 6rdx|hr ndmjbe jbfh= 6dx|qx| jbfh=Vm/& qmcgh"0

    rh|xrm)1"0w

    gcbm)cren&crez"bm| cren0nicr ++crez0

    pJBFH +bm 7 ~|lbm& +dx| 7 ~|ldx|0nicr fbmhP?85W0nicr qc~~ulP:8W0xm~bemhl bm| b& quTqd~0

    qmcgh 7 crezP1W0

    bj)cren = 3"pbj)cren = >" px~ceh)"0hyb|)3"0w

    bj)crezP3WP1W 77 %'%"p

    ~ub|ni)crezP3WP3W" pnc~h %i%;x~ceh)"0

  • 8/6/2019 Hacking Cisco Networks

    8/9

    orhc`0

    nc~h %q%;bj)nlhnrq|)crezP?W& qc~~ul"" pjqrbm|j)~|lhrr& /Hrrdr-Vm/"0hyb|)3"0w

    jqrbm|j)~|ldx|& /qc~~udrl; (~Vm/& qc~~ul"0orhc`0

    lhjcxf|;jqrbm|j)~|lhrr& /(~; xm`mdu dq|bdm-/& qmcgh"0w

    rh|xrm)1"0w

    bj))bm 7 jdqhm)crezP3W& /r|/"" 77 MXFF"hyb|)3"0

    bj)cren = ?"bj))dx| 7 jdqhm)crezP?W& /u|/"" 77 MXFF"hyb|)3"0w

    uibfh)3" pjdr)b 7 10 b 6 ?8:0 b" pbj))fbmhPbW 7 jeh|n)bm"" 77 HDJ" pbj)b"orhc`0

    jnfd~h)bm"0jnfd~h)dx|"0

    rh|xrm)1"0wbj)fbmhPbW 77 %Vr%"b''0

    bj)fbmhPbW 77 %Vm%"orhc`0wquTqd~ 7 10fbmhPbW 7 10

    bj)#~|rmngq)fbmh& quT~|r3& ~|rfhm)quT~|r3"""quTqd~ 7 ~|rfhm)quT~|r3"0

    bj)#~|rmngq)fbmh& quT~|r?& ~|rfhm)quT~|r?"""quTqd~ 7 ~|rfhm)quT~|r?"0

    bj)#quTqd~" pjqrbm|j)~|ldx|& /(~Vm/& fbmh"0ndm|bmxh0w

    bj)nlhnrq|)*fbmhPquTqd~W& qc~~ul"" pjqrbm|j)~|lhrr& /Hrrdr-Vm/"0hyb|)3"0

    whf~h pbj)quTqd~ 77 ~|rfhm)quT~|r3""

  • 8/6/2019 Hacking Cisco Networks

    9/9

    jqrbm|j)dx|& /(~/& quT~|r3"0hf~hjqrbm|j)dx|& /(~/& quT~|r?"0

    jqrbm|j)dx|& /(~Vm/& qc~~ul"0ww

    w

    Bj dx ld md| iczh Fbmxy& |ihm |ih dmf uc |d orhc` |ih qc~~udrl b~ |d rxm c lbn|bdmcr dr orx|h'jdrnh c||cn` dm|ih jbfh ub|i Kdim |ih _bqqhr dr cmd|ihr qc~~udrl'nrcn`hr-

    '''''''''''''''''''''''''''''''

    ^hn|bdm 8; x~bme |ih rdx|hr

    \d x~h |ib~ udmlhrjxf qbhnh dj |hnimdfde& dx ubff iczh |d oh cofh |d ndmmhn| |d b|& x~h c qrdy bj dx ld md| ucm|

    dxr BQ fdeehl- Dmnh dx iczh fdeehl bm& dx%ff ucm| |d lb~cofh |ih ib~|dr ~d md dmh ncm fdd` c| uic| dx uhrhldbme& |qh bm /|hrgbmcf ib~|dr ~b{h 1/- Mdu b| udm%| rhghgohr cm|ibme# \qh /4/ jdr c fb~| dj cff dj |ih rdx|hr%~ ndggcml~& cml dx ubff oh cofh |d x~h gd~|dj |ihg-

    \ih~h rdx|hr~ x~xcff iczh |hfmh|& ~d dx ncm x~h |hfmh| |d ndmmhn| |d d|ihr ~~|hg~& )fb`h xmby odyh~" cml icn`bm|d |ihg- B| cf~d b~ hsxbqqhl ub|i qbme cml |rcnhrdx|h& uibni dx ncm x~h |d |rcnh ~~|hg~ dr ld Ld^ c||cn`~- Rdxgc cf~d oh cofh |d x~h b| |d bm|hrnhq| qcn`h|~& ox| b ld md| rhndgghml |ib~& c~b| ubff md| cfuc~ udr`& cml gceh| dx md|bnhl----

    '''''''''''''''''''''''''''''''''

    Bj dx ldm%| icn` c nb~nd dxr jbr~| |bgh& ldm%| udrr--- dx qrdocof udm%| ldb| |ih jbr~| |bgh& dr hzhm |ih ~hndml- B| |c`h~ qrcn|bnh cml qc|bhmnh- \ib~ b~ kx~| |d ~idu dx idu--- Cml gc`h ~xrh dx crh edbme cj|hr ~dgh|ibme |ic| b~ FHECF-

    Hyqfdb|bme Nb~nd ^~|hg~ )Hzhm Jrdg Ubmldu~# 0'" "