News

Here was a tool that I could use to not only identify weaknesses in layer 3 routing protocol deployments, but also show what an attacker could do if they were able to manipulate dynamic routing ...