[17893] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Cisco 675 Denial of Service Attack

daemon@ATHENA.MIT.EDU (Erik Parker)
Fri Dec 1 17:20:14 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.GSO.4.30.0012011234560.10941-100000@noella.mindsec.com>
Date:         Fri, 1 Dec 2000 12:36:41 -0800
Reply-To: Erik Parker <eparker@MINDSEC.COM>
From: Erik Parker <eparker@MINDSEC.COM>
X-To:         poke <poke@OLY.SILVERLINK.NET>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.BSI.4.05L.10011302044170.21281-100000@oly.silverlink.net>

Or the ability to change it.. You can't change the Cisco 675 out of Bridge
mode into Route mode without the cooperation of Qwest/Whoever. They have
to make changes on their router as well. I went through this for a week
with Flashcom, to get out of briding mode.

Most never get their password for their Cisco either, however you can dump
the memory in the CBOS on boot, and read the "encrypted" password, which
is an off-by-2 sequence.. Where c is a, and e is c, and so on.



> QWest DSL (of which I am a customer/user) uses the 675 in bridging mode
> (in fact that is how it was delivered). AFIK it can be affected by traffic
> about as much as a dumb hub can. However, you can make it active, give it
> an IP address etc if you want to use it's NAT or WebAdmin capabilities.
> Then you are vulnerable... 99% of those QWest customers who use the 675
> probably wouldn't have a clue or a reason to change this.
>
> -Chuck





Erik Parker
Mind Security

An armed society, is a polite society.

home help back first fref pref prev next nref lref last post