Booting Security
In previous notes I made an outrageous claim; if I can physically access the equipment, I can normally crack it in seconds. Most manufacturers are more interested in making equipment convenient to use and to reduce support calls than they are in security. Despite their prevalence in the market, same is true of Cisco equipment. Before I am accused of being biased (!) I should note that the security bypasses that I discuss in these notes exist on almost all manufacturer’s equipment.
Last updated