[83308] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Cisco crapaganda

daemon@ATHENA.MIT.EDU (Maness, Drew)
Wed Aug 10 13:13:01 2005

Date: Wed, 10 Aug 2005 13:11:35 -0400
From: "Maness, Drew" <Drew.Maness@disney.com>
To: <Michael.Dillon@btradianz.com>, <nanog@merit.edu>
Errors-To: owner-nanog@merit.edu


This is a multi-part message in MIME format.

------_=_NextPart_001_01C59DCE.8FCB4F5C
Content-Type: text/plain;
	charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Lynn refered to FX from phenoelit's presentation at blackhat 3 years =
ago.  Http://www.phenoelit.de


-----Original Message-----
From:	owner-nanog@merit.edu on behalf of Michael.Dillon@btradianz.com
Sent:	Wed 8/10/2005 6:14 AM
To:	nanog@merit.edu
Cc:=09
Subject:	Re: Cisco crapaganda

> I, desperately, hope you are not referring to Raven Adler's=20
> presentation at Defcon following Black Hat.

No, I am referring to something that was published
3 years ago and describes substantially the same
exploits and techniques as Lynn described except the
3 year old document has much more technical detail and
offers a URL where source code for the exploits can
be acquired.

Maybe Lynn rediscovered this independently. Maybe he
heard rumours of an exploit in blackhat communications
and this guided him where to look. But if my memory
serves me correctly, Lynn himself claimed that his work
was based on the work of a blackhat.

--Michael Dillon





------_=_NextPart_001_01C59DCE.8FCB4F5C
Content-Type: text/html;
	charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DWindows-1252">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
6.0.6603.0">
<TITLE>RE: Cisco crapaganda</TITLE>
</HEAD>
<BODY>
<!-- Converted from text/plain format -->

<P><FONT SIZE=3D2>Lynn refered to FX from phenoelit's presentation at =
blackhat 3 years ago.&nbsp; <A =
HREF=3D"Http://www.phenoelit.de">Http://www.phenoelit.de</A><BR>
<BR>
<BR>
-----Original Message-----<BR>
From:&nbsp;&nbsp; owner-nanog@merit.edu on behalf of =
Michael.Dillon@btradianz.com<BR>
Sent:&nbsp;&nbsp; Wed 8/10/2005 6:14 AM<BR>
To:&nbsp;&nbsp;&nbsp;&nbsp; nanog@merit.edu<BR>
Cc:&nbsp;&nbsp;&nbsp;&nbsp;<BR>
Subject:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Re: Cisco =
crapaganda<BR>
<BR>
&gt; I, desperately, hope you are not referring to Raven Adler's<BR>
&gt; presentation at Defcon following Black Hat.<BR>
<BR>
No, I am referring to something that was published<BR>
3 years ago and describes substantially the same<BR>
exploits and techniques as Lynn described except the<BR>
3 year old document has much more technical detail and<BR>
offers a URL where source code for the exploits can<BR>
be acquired.<BR>
<BR>
Maybe Lynn rediscovered this independently. Maybe he<BR>
heard rumours of an exploit in blackhat communications<BR>
and this guided him where to look. But if my memory<BR>
serves me correctly, Lynn himself claimed that his work<BR>
was based on the work of a blackhat.<BR>
<BR>
--Michael Dillon<BR>
<BR>
<BR>
<BR>
</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C59DCE.8FCB4F5C--

home help back first fref pref prev next nref lref last post