Things To Do in Cisco Land When You’re Dead - gauis 〈gaius@hert.org〉 [2000-05-01] http://www.phrack.org/phrack/56/p56-0x0a [ ] Bypassing Cisco SNMP access lists using Spoofed SNMP Requests - muts 〈mati@see-security.com〉 [2005-08-02] http://www.remote-exploit.org/index.php/SNMP_Spoof [ ] Remote Router Traffic Sniffing http://www.remote-exploit.org/index.php/Router_sniff [ ] Cisco SNMP configuration attack with a GRE tunnel http://www.securityfocus.com/infocus/1847 [ ] Exploiting Cisco Routers: Part 1 - Mark Wolfgang 〈moonpie@moonpie.org〉 [2003-09-29] http://www.securityfocus.com/infocus/1734 Exploiting Cisco Routers: Part 2 http://www.securityfocus.com/infocus/1749 [ ] Cisco Article Published on SecurityFocus http://www.hackingdefined.com/downloads/cisco-secfocus.pdf [ ] Using a Compromised Router to Capture Network Traffic - David Taylor [2002-09-07] http://infosecwriters.com/texts.php?op=display&id=41 [ ] Sniffing Networks: The Complete Documentation http://www.l0t3k.org/security/docs/sniffing/