[167783] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NSA able to compromise Cisco, Juniper, Huawei switches

daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Mon Dec 30 06:28:48 2013

From: "Dobbins, Roland" <rdobbins@arbor.net>
To: "nanog@nanog.org list" <nanog@nanog.org>
Date: Mon, 30 Dec 2013 11:28:26 +0000
In-Reply-To: <20131230100632.GA15285@pob.ytti.fi>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Dec 30, 2013, at 5:06 PM, Saku Ytti <saku@ytti.fi> wrote:

> The quality of this data is too damn low.

The #1 way that Cisco routers and switches are compromised is brute-forcing=
 against an unsecured management plane, with username 'cisco' and password =
'cisco.

The #1 way that Juniper and switches are compromised is brute-forcing again=
st an unsecured management plane, with username 'cisco' and password 'cisco=
.

;>

Note that both Cisco and Juniper have many platforms, running on various ha=
rdware, and running various OSes/trains/releases/throttles

-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

	  Luck is the residue of opportunity and design.

		       -- John Milton



home help back first fref pref prev next nref lref last post