Why “and beyond”?: exploit password reuse
çDump all passwords stored on device and try against all login interfaces on target company’s netblocks
¼Passwords could be found on:  client-side HTML source code, config file, SNMP OIDs
¼Login interfaces include: SSH, telnet, FTP, Terminal Services, VNS, SSL VPNs (i.e.: Juniper SA), SNMP, etc …
ç