[<prev] [next>] [day] [month] [year] [list]
Message-ID: <D731AA5BBF57C049AB41902FAB207D0C0123DB2A@dclondon.local.irmplc.com>
Date: Thu, 14 Aug 2008 14:31:09 +0100
From: "Gyan Chawdhary" <gyan.chawdhary@...plc.com>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Cisco IOS Shellcodes
Following our Cisco IOS shell code presentation at Blackhat Vegas 2008,
IRM has decided to release three variants of the IOS shell codes
discussed in the presentation. Following are the payloads that can be
used as both code execution based payloads and runtime memory resident
backdoors within IOS:-
* Password protected bind shell -
http://www.irmplc.com/downloads/presentations/IOS_Bindshell_v.1.0.txt
* Connect Back Shell -
http://www.irmplc.com/downloads/presentations/IOS_Connectback_v.1.0.txt
* Two byte overwrite bind shell -
http://www.irmplc.com/downloads/presentations/IOS_tiny_v.1.0.txt
Regards,
Gyan Chawdhary
Gyan Chawdhary | Senior Consultant
Information Risk Management Plc
8th Floor | Kings Buildings | Smith Square | London SW1P 3JJ
Tel: +44 (0)20 7808 6420
Fax: +44 (0)20 7808 6421
www.irmplc.com <http://www.irmplc.com/>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists