[83310] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Cisco crapaganda

daemon@ATHENA.MIT.EDU (Maness, Drew)
Wed Aug 10 13:36:43 2005

Date: Wed, 10 Aug 2005 10:33:39 -0700
From: "Maness, Drew" <Drew.Maness@disney.com>
To: "Maness, Drew" <Drew.Maness@disney.com>,
	<Michael.Dillon@btradianz.com>, <nanog@merit.edu>
Errors-To: owner-nanog@merit.edu


This is a multi-part message in MIME format.

------_=_NextPart_001_01C59DD1.A5422C80
Content-Type: text/plain;
	charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Sorry 2 years ago (2003)

http://www.blackhat.com/html/bh-multi-media-archives.html#USA-2003

FX - More (Vulnerable) Embedded Systems

Lynn also refered to a "Chinese Hacker" group that was reviewing pieces =
of stolen IOS code for the sole purpose of shovleing shell code into =
IOS.




-----Original Message-----
From:	owner-nanog@merit.edu on behalf of Maness, Drew
Sent:	Wed 8/10/2005 10:11 AM
To:	Michael.Dillon@btradianz.com; nanog@merit.edu
Cc:=09
Subject:	RE: Cisco crapaganda
Lynn refered to FX from phenoelit's presentation at blackhat 3 years =
ago.  Http://www.phenoelit.de


-----Original Message-----
From:	owner-nanog@merit.edu on behalf of Michael.Dillon@btradianz.com
Sent:	Wed 8/10/2005 6:14 AM
To:	nanog@merit.edu
Cc:=09
Subject:	Re: Cisco crapaganda

> I, desperately, hope you are not referring to Raven Adler's=20
> presentation at Defcon following Black Hat.

No, I am referring to something that was published
3 years ago and describes substantially the same
exploits and techniques as Lynn described except the
3 year old document has much more technical detail and
offers a URL where source code for the exploits can
be acquired.

Maybe Lynn rediscovered this independently. Maybe he
heard rumours of an exploit in blackhat communications
and this guided him where to look. But if my memory
serves me correctly, Lynn himself claimed that his work
was based on the work of a blackhat.

--Michael Dillon








------_=_NextPart_001_01C59DD1.A5422C80
Content-Type: text/html;
	charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DWindows-1252">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
6.0.6603.0">
<TITLE>RE: Cisco crapaganda</TITLE>
</HEAD>
<BODY>
<!-- Converted from text/plain format -->

<P><FONT SIZE=3D2>Sorry 2 years ago (2003)<BR>
<BR>
<A =
HREF=3D"http://www.blackhat.com/html/bh-multi-media-archives.html#USA-200=
3">http://www.blackhat.com/html/bh-multi-media-archives.html#USA-2003</A>=
<BR>
<BR>
FX - More (Vulnerable) Embedded Systems<BR>
<BR>
Lynn also refered to a &quot;Chinese Hacker&quot; group that was =
reviewing pieces of stolen IOS code for the sole purpose of shovleing =
shell code into IOS.<BR>
<BR>
<BR>
<BR>
<BR>
-----Original Message-----<BR>
From:&nbsp;&nbsp; owner-nanog@merit.edu on behalf of Maness, Drew<BR>
Sent:&nbsp;&nbsp; Wed 8/10/2005 10:11 AM<BR>
To:&nbsp;&nbsp;&nbsp;&nbsp; Michael.Dillon@btradianz.com; =
nanog@merit.edu<BR>
Cc:&nbsp;&nbsp;&nbsp;&nbsp;<BR>
Subject:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RE: Cisco =
crapaganda<BR>
Lynn refered to FX from phenoelit's presentation at blackhat 3 years =
ago.&nbsp; <A =
HREF=3D"Http://www.phenoelit.de">Http://www.phenoelit.de</A><BR>
<BR>
<BR>
-----Original Message-----<BR>
From:&nbsp;&nbsp; owner-nanog@merit.edu on behalf of =
Michael.Dillon@btradianz.com<BR>
Sent:&nbsp;&nbsp; Wed 8/10/2005 6:14 AM<BR>
To:&nbsp;&nbsp;&nbsp;&nbsp; nanog@merit.edu<BR>
Cc:&nbsp;&nbsp;&nbsp;&nbsp;<BR>
Subject:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Re: Cisco =
crapaganda<BR>
<BR>
&gt; I, desperately, hope you are not referring to Raven Adler's<BR>
&gt; presentation at Defcon following Black Hat.<BR>
<BR>
No, I am referring to something that was published<BR>
3 years ago and describes substantially the same<BR>
exploits and techniques as Lynn described except the<BR>
3 year old document has much more technical detail and<BR>
offers a URL where source code for the exploits can<BR>
be acquired.<BR>
<BR>
Maybe Lynn rediscovered this independently. Maybe he<BR>
heard rumours of an exploit in blackhat communications<BR>
and this guided him where to look. But if my memory<BR>
serves me correctly, Lynn himself claimed that his work<BR>
was based on the work of a blackhat.<BR>
<BR>
--Michael Dillon<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
<BR>
</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C59DD1.A5422C80--

home help back first fref pref prev next nref lref last post