[167783] in North American Network Operators' Group
Re: NSA able to compromise Cisco, Juniper, Huawei switches
daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Mon Dec 30 06:28:48 2013
From: "Dobbins, Roland" <rdobbins@arbor.net>
To: "nanog@nanog.org list" <nanog@nanog.org>
Date: Mon, 30 Dec 2013 11:28:26 +0000
In-Reply-To: <20131230100632.GA15285@pob.ytti.fi>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Dec 30, 2013, at 5:06 PM, Saku Ytti <saku@ytti.fi> wrote:
> The quality of this data is too damn low.
The #1 way that Cisco routers and switches are compromised is brute-forcing=
against an unsecured management plane, with username 'cisco' and password =
'cisco.
The #1 way that Juniper and switches are compromised is brute-forcing again=
st an unsecured management plane, with username 'cisco' and password 'cisco=
.
;>
Note that both Cisco and Juniper have many platforms, running on various ha=
rdware, and running various OSes/trains/releases/throttles
-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>
Luck is the residue of opportunity and design.
-- John Milton