nanog mailing list archives
lawful intercept/IOS at BlackHat DC, bypassing and recommendations
From: Gadi Evron <ge () linuxbox org>
Date: Thu, 04 Feb 2010 22:19:29 +0200
"That peer-review is the basic purpose of my Blackhat talk and the associated paper. I plan to review Cisco’s architecture for lawful intercept and explain the approach a bad guy would take to getting access without authorization. I’ll identify several aspects of the design and implementation of the Lawful Intercept (LI) and Simple Network Management Protocol Version 3 (SNMPv3) protocols that can be exploited to gain access to the interface, and provide recommendations for mitigating those vulnerabilities in design, implementation, and deployment."
More here: http://blogs.iss.net/archive/blackhatlitalk.html Gadi. -- Gadi Evron, ge () linuxbox org. Blog: http://gevron.livejournal.com/
Current thread:
- lawful intercept/IOS at BlackHat DC, bypassing and recommendations Gadi Evron (Feb 04)
- Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations Christopher Morrow (Feb 04)
- Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations Christopher Morrow (Feb 04)
- Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations Tony Varriale (Feb 04)
- Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations Crist Clark (Feb 04)
- Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations Christopher Morrow (Feb 04)
- Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations Steven Bellovin (Feb 04)
- Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations Christopher Morrow (Feb 04)
- Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations Steven Bellovin (Feb 04)
- Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations Marcus Reid (Feb 04)
- Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations Christopher Morrow (Feb 04)