Using a Compromised Router to Capture Network Traffic - This document details the approach, methodology and results of a recent experiment using GRE tunnels to sniff all traffic passing through a Cisco router.
Using a Compromised Router to Capture Network Traffic - This document details the approach, methodology and results of a recent experiment using GRE tunnels to sniff all traffic passing through a Cisco router.