lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1127159739.28728.9.camel@whale.core.arhont.com>
Date: Mon, 19 Sep 2005 20:55:39 +0100
From: Andrei Mikhailovsky <mlists@...ont.com>
To: ciscoioshehehe@...dex.ru
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: Cisco IOS hacked?

Hello,

Being a co-author of the "Hacking Exposed Cisco Networks" book and one
of the co-founders of Arhont Ltd an Information Security Company that is
doing the research for the book on Cisco Devices I have to make the
following comments about the article in SecurityLab.ru:

The russian article (http://www.securitylab.ru/news/240415.php) has been
badly paraphrased from the livejournal of one of the authors/researchers
of the book. As a result of this outrageously inaccurate paraphrasing of
the article many confusions and misunderstandings have been circling on
the security related sources and mailing lists.


Some of the issues addressed in the article are true and Arhont is
currently preparing a formal advisory that will be sent to PSIRT. 


Among the discovered issues are multiple vulnerabilities in EIGRP
implementation. Also, authors have addressed the _theoretical_ aspects
of an algorithm for cross-platform worm that could spread in IOS based
devices. The existence of the practical implementation of such warm is a
complete lie. Let me assure that there has been no development nor the
desire to develop such code by the authors of the book. The theoretical
methodology and algorithms will be also discussed with PSIRT at the
appropriate time.


In addition, there has been some minor inconsistencies of the
livejournal postings that will be soon addressed and edited.

If you have any comments on this topic we would be glad to address them.

-- 
Andrei Mikhailovsky
Arhont Ltd - Information Security




On Mon, 2005-09-19 at 10:52 +0400, ciscoioshehehe wrote:
> today news on SecurityLab.ru (only in russian):
> 
> http://www.securitylab.ru/news/240415.php
> 
> * break CRC on CISCO IOS
> * Desgin Mechanism of cross-platform worm for IOS device.
> *  Run IRC server on 2600 CISCO.
> * Found more vulnerabilities in EIGRP protocol.
> 
> and some more...
> 
> Online translate from Russian:
> 
> http://www.translate.ru/url/tran_url.asp?lang=ru&url=http%3A%2F%2Fwww.securitylab.ru%2Fnews%2F240415.php&direction=re&template=General&cp1=NO&cp2=NO&autotranslate=on&transliterate=on&psubmit2.x=45&psubmit2.y=17
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/


Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ