Results 1 to 3 of 3

Thread: Exploiting Cisco Devices

  1. #1
    Senior Member
    Join Date
    Aug 2002
    Posts
    239

    Exclamation Exploiting Cisco Devices

    Hey guys,

    I know some here employ Cisco technology in networks, either at home or at your business. I thought this article might prove beneficial. It was recently released at SecurityFocus

    Exploiting Cisco Routers (Part 1)
    http://www.securityfocus.com/infocus/1734

    Happy reading!
    It\'s 106 miles to Chicago, we\'ve got a full tank of gas, half a pack of cigarettes, it\'s dark and we\'re wearing sunglasses.

    Hit it!

  2. #2
    Senior Member
    Join Date
    Sep 2003
    Posts
    156
    good read.

    One of the first things I do when I get any cisco device is check and make sure the http server is disabled if there is one.

    thanks again.

  3. #3
    Senior Member tampabay420's Avatar
    Join Date
    Aug 2002
    Posts
    953
    there was a nice cisco article in phrack 60!
    http://www.phrack.org/phrack/60/p60-0x07.txt

    1 - Introduction and Limitations
    2 - Identification of an overflow
    3 - IOS memory layout sniplets
    4 - A free() exploit materializes
    5 - Writing (shell)code for Cisco
    6 - Everything not covered in 1-5
    yeah, I\'m gonna need that by friday...

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •