Penetration Testing mailing list archives
exploiting TACACS+
From: Valter Santos <vsantola () sectoid com>
Date: Tue, 26 Jul 2005 09:54:25 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi folks, i'm conduting a pentest where i found a cisco router with telnet open to the world. The route is using TACACS+ for autentication. Can some one give me some lights on how to exploit this without using bruteforce ? :-) thanx in advance /valter -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFC5fpBR7pJvOKksgYRAkZmAKDeeu8TTjDFJWGyGcAfxV2y4WUVjgCggNbP g2dBwn7zDjb8ewHGEx71+TM= =yrZN -----END PGP SIGNATURE-----
Current thread:
- exploiting TACACS+ Valter Santos (Jul 26)