# Further study

Many discussions of potential exploits for IOS exist. The general techniques are discussed in “The Shell Coder’s Handbook” (Wiley).&#x20;

A good introduction is given in “Killing the myth of Cisco IOS rootkits: DIK (Da Ios rootKit)” (Sebastian Muñiz)&#x20;

For balance, you should read “Rootkits on CISCO IOS devices” Cisco document ID: 582. This provides background information on how to do QA on your CISCO software images.&#x20;

Any security professional should also review “Cisco Guide to Harden Cisco IOS Devices” Cisco document ID: 13608, or more correctly, chase down the specific manual for the device and software release you are using.&#x20;

Read an [analysis of IOS issues](http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-fx.pdf)

It is not just CISCO; similar techniques will apply to other equipment. Techniques are in the wild for hacking SOHO devices, as an example see “Owning the Network: Adventures in Router Rootkits” (Michael Coppola, DEFCON 2012).&#x20;

At the enterprise level, we centralize authentication, authorization and accounting (AAA) and use a centralized server and services, no local accounts. Do a search on the Cisco command **aaa new-mode**l and make sure you understand the issues and the terminology.
