nanog mailing list archives
Re: Cisco IOS Vulnerability
From: "Petri Helenius" <pete () he iki fi>
Date: Fri, 18 Jul 2003 10:50:53 +0300
cisco posted what the four 'bad' protocol types were in rev 1.3 of the online doc - now it is just an academic exercise to get them crafted correctly........no imagination necessary, only a router, a cco login, and a traffic generator needed
With rev 1.0 it took me two hours. IP protocol space is only eight bits anyway. 1.3 gives exploit options for less networking oriented people too. Pete
Current thread:
- Re: Cisco IOS Vulnerability, (continued)
- Re: Cisco IOS Vulnerability Jared Mauch (Jul 16)
- RE: Cisco IOS Vulnerability Sean Donelan (Jul 16)
- Re: Cisco IOS Vulnerability Jeff Kell (Jul 16)
- Re: Cisco IOS Vulnerability Jack Bates (Jul 17)
- Re: Cisco IOS Vulnerability Andy Dills (Jul 17)
- Re: Cisco IOS Vulnerability Joe Abley (Jul 17)
- Re: Cisco IOS Vulnerability micah mcnelly (Jul 17)
- Re: Cisco IOS Vulnerability Michael Painter (Jul 17)
- Re: Cisco IOS Vulnerability Daniel Karrenberg (Jul 18)
- Re: Cisco IOS Vulnerability joshua sahala (Jul 18)
- Re: Cisco IOS Vulnerability Petri Helenius (Jul 18)
- RE: Cisco IOS Vulnerability Darrell Kristof (Jul 16)
- Re: Cisco IOS Vulnerability Valdis . Kletnieks (Jul 17)
- Re: Cisco IOS Vulnerability Brian Wallingford (Jul 17)
- RE: Cisco IOS Vulnerability Barry Raveendran Greene (Jul 17)
- Re: Cisco IOS Vulnerability Petri Helenius (Jul 17)
- RADb ? mike harrison (Jul 22)
- Re: RADb ? Kevin Oberman (Jul 22)
- Re: Cisco IOS Vulnerability Valdis . Kletnieks (Jul 17)
- Re: Cisco IOS Vulnerability Jack Bates (Jul 17)
- RE: Cisco IOS Vulnerability Jay Hennigan (Jul 17)