Detailed analysis of security vulnerabilities
A router's routing tables can be obtained from arbitrary hosts.