what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed


Writing Cisco IOS Rootkits
Posted Oct 10, 2015
Authored by Luca Hall | Site grid32.com

This paper is about the work involved in modifying firmware images with the test case focused on Cisco IOS. It will show how it is a common misconception that doing such a thing involves advanced knowledge or nation state level resources. This paper provides sound methodologies, shows how to approach the subject, and walks the reader through the entire process while providing the necessary knowledge so that by the end of the paper, if the reader is to follow it completely through, they will have a basic but functional firmware rootkit.

tags | paper
systems | cisco, ios
MD5 | bb095447484a76e5c74d10f604b716f8

Related Files

Fuzzing: An Introduction To Sully Framework
Posted May 23, 2013
Authored by High-Tech Bridge SA | Site htbridge.com

This paper is an introduction to the world of fuzzing by exploring the Sulley Fuzzing Framework.

tags | paper, fuzzer
MD5 | a2da69544935d46674e792fbedfe927f
Analyzing WordPress Themes
Posted Mar 27, 2012
Authored by MaXe

This paper is about discovering vulnerabilities inside the files that make up WordPress themes. It also discusses reverse engineering of encoded PHP files, common tools, exploits, and dangerous copyright protection mechanisms.

tags | paper, php, vulnerability
MD5 | 5db141a79f177a46eeefb27ea5a7acc7
Breaking The Links: Exploiting The Linker
Posted Jul 5, 2011
Authored by Tim Brown | Site nth-dimension.org.uk

The recent discussion relating to insecure library loading on the Microsoft Windows platform provoked a significant amount of debate as to whether GNU/Linux and UNIX variants could be vulnerable to similar attacks. Whilst the general consensus of the Slashdot herd appeared to be that this was just another example of Microsoft doing things wrong, the author felt this was unfair and responded with a blog post that sought to highlight an example of where POSIX style linkers get things wrong. Based on the feedback received to that post, the author decided to investigate the issue a little further. This paper is an amalgamation of what was learnt.

tags | paper
systems | linux, windows, unix, osx
MD5 | c2e33de59c93dcc1dc48a0dd72ca382f
Penetration Testing / Hacking Overview
Posted Feb 4, 2011
Authored by sup3r

This paper is a high-level overview of the threat space used during penetration testing and hacking.

tags | paper
MD5 | eecdc03df308819d185ee5f95a2ec9f7
Reverse Engineering Tutorial
Posted Jun 8, 2010
Authored by 6_Bl4ck9_f0x6, vipercorp, F3rGO

Viper Corp Collection Issue 0x02 - This paper is a reverse engineering tutorial. It was originally written in Portuguese by F3rGO and has been translated.

tags | magazine
MD5 | c57e41ecbddbae3d87f9a8122400a773
French Whitepaper On SQL Injection
Posted Jul 2, 2009
Authored by Moudi

This paper is a small SQL injection tutorial and is written in French.

tags | paper, sql injection
MD5 | bf3f1c6f7bdf4e4b8f22bcd694f4dc5e
Posted Mar 12, 2008
Site secure-medicine.org

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. This paper is a study regarding wireless technology in implantable cardioverter defibrillators (ICDs) being susceptible to hack attacks.

tags | paper
MD5 | c3527311ae3a42d7f38f306443509814
Posted Feb 26, 2008
Authored by Joerg Scheinert | Site nruns.com

Hacking A Default jBoss Installation Using A Browser. This paper is a brief how-to on hacking a default installation using the JMX-Console.

tags | paper
MD5 | 7eb87fd95c756ffe30ba6dc3a886a120
Posted Jun 28, 2007
Authored by Gyan Chawdhary | Site irmplc.com

It has been more than a year since Michael Lynn first demonstrated a reliable code execution exploit on Cisco IOS at Black Hat 2005. Although his presentation received a lot of media coverage in the security community, very little is known about the attack and the technical details surrounding the IOS check_heaps() vulnerability. This paper is a result of research carried out by IRM to analyze and understand the check_heaps() attack and its impact on similar embedded devices.

tags | paper, code execution
systems | cisco
MD5 | de1e5098e579eb286a1dbc30729d80a5
Posted Dec 31, 2004
Authored by Okiwan

Ciscos.c v1.3 scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.

systems | cisco
MD5 | c8d0bd0b1965c7973a76097d542488d6
Cisco Security Advisory 20031202-SNMP-trap
Posted Dec 3, 2003
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory 20031202 - Cisco Aironet Access Points (AP) running Cisco IOS software will send any static Wired Equivalent Privacy (WEP) key in the cleartext to the Simple Network Management Protocol (SNMP) server if the snmp-server enable traps wlan-wep command is enabled. Cisco Aironet 1100, 1200, and 1400 series are affected, but the command is disabled by default.

tags | protocol
systems | cisco
MD5 | 65518f0742d4bd46b464f831a968adf3
Posted Oct 3, 2003
Authored by Evol

Writing describing the short comings of Cisco's LEAP authentication used on their wireless access points and how to score root on them.

tags | paper, root
systems | cisco
MD5 | bcf6a5675f0080ac019286e703d133c6
Posted Aug 10, 2003
Authored by deadbeat

Remote denial of service exploit for the Cisco CSS 11000 Series.

tags | exploit, remote, denial of service
systems | cisco
MD5 | fd1172b357f5184e5985b355b0690ccd
Posted Aug 10, 2003
Authored by FX | Site phenoelit.de

Cisco IOS 12.x/11.x remote exploit for the HTTP integer overflow using a malformed HTTP GET request and two gigabytes of data.

tags | exploit, remote, web, overflow
systems | cisco
MD5 | c9ac23b2148d2852017b34f6302f570b
Posted Jul 29, 2003
Authored by Cisco Systems PSIRT

Cisco Security Advisory - Sending a malformed URL to the Cisco Aironet AP1x00 can cause the device to reload resulting in a denial of service.

tags | advisory, denial of service
systems | cisco
advisories | CVE-2003-0511
MD5 | 8b9769d31f0d581d3b0ae51da7b56204
Posted Jul 21, 2003
Authored by Zerash

Remote exploit that causes a denial of service against Cisco IOS versions 11.x through 12.x using hping.

tags | exploit, remote, denial of service
systems | cisco
MD5 | 5b4d3da440603ada84738a3464e28b7e
Posted Jul 21, 2003
Authored by Martin Kluge

Remote exploit that causes a denial of service against Cisco IOS versions 11.x through 12.x.

tags | exploit, remote, denial of service
systems | cisco
MD5 | 1221af8aa6ac91916c03e6b599441b55
Posted Jul 18, 2003
Authored by Cisco Systems PSIRT | Site cisco.com

Cisco Security Advisory: Cisco routers and switches running the IOS software are vulnerable to a denial of service attack. A rare sequence of crafted IPv4 packets sent directly to the device may cause the input interface to stop processing traffic once the input queue is full.

tags | advisory, denial of service
systems | cisco
MD5 | 494aa21fabcd6eea29e1ec140e0746f3
Posted Jul 11, 2003
Authored by Cisco Systems PSIRT | Site cisco.com

Cisco Security Advisory: After receiving eight TCP connection attempts using a non-standard TCP flags combination, a Catalyst switch will stop responding to further TCP connections to that particular service. In order to re-establish functionality of that service, the switch must be rebooted. CatOS for the following models is affected: 4000 Series including models 2948G and 2980G/2980G-A, 5000 Series including models 2901, 2902 and 2926, and the 6000.

tags | advisory, tcp
systems | cisco
MD5 | 4defc521fe49f9063479c9a5e13d6a65
Posted May 8, 2003
Authored by Cisco Systems PSIRT | Site cisco.com

Cisco Security Advisory: Multiple vulnerabilities have been found in the Cisco VPN 3000 Concentrator series which includes models 3005, 3015, 3030, 3060, 3080 and the Cisco VPN 3002 Hardware Client. The enabling IPSec over TCP, malformed SSH initialization packet, and malformed ICMP traffic vulnerabilities are discussed.

tags | advisory, tcp, vulnerability
systems | cisco
MD5 | 2871da229ac3afe1c329311dc949412e
Posted Apr 25, 2003

Cisco Security Advisory: Cisco Catalyst software permits unauthorized access to the enable mode in the 7.5(1) release. Once initial access is granted, access can be obtained for the higher level "enable" mode without a password. This

tags | advisory
systems | cisco
MD5 | ed65a75f9c215c3ed65426ae5f12726a
Posted Apr 24, 2003
Site cisco.com

Cisco Security Advisory - Cisco Secure ACS for Windows is vulnerable to a buffer overflow on the administration service which runs on TCP port 2002. Exploitation of this vulnerability results in a Denial of Service, and can potentially result in system administrator access. Cisco Secure ACS versions up to and including version 2.6.4 , 3.0.3, and 3.1.1 are affected by this vulnerability.

tags | advisory, denial of service, overflow, tcp
systems | cisco, windows
MD5 | 657c211471c31a5ea9d1f739db0a8ccd
Posted Apr 3, 2003
Authored by Necrose | Site truncode.org

Service Banner Fingerprinting in C - This paper is a supplement to modular's tcpscan series. It covers how to write C programs that will perform banner fingerprinting using various standard servers as examples.

tags | paper
MD5 | a611e0fe3d1b0528e52529097ee21b9f
Posted Nov 17, 2002

Defcon 10 Presentation: CiscoPacketTelephonyCenter-ANovelApproachfortheMa in PDF format

MD5 | 5fa923ac12ff71f16cc5082eb57b7423
Posted Nov 17, 2002

Defcon 10 Presentation: CiscoSecureIntrusionDetectionSystemFrequentlyAskedQu in PDF format

MD5 | ae6ae01f3d77614235bbc01fda4b200e
Page 1 of 4

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    1 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    12 Files
  • 13
    Feb 13th
    18 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    19 Files
  • 20
    Feb 20th
    20 Files
  • 21
    Feb 21st
    15 Files
  • 22
    Feb 22nd
    2 Files
  • 23
    Feb 23rd
    2 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    37 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By