Quantcast
Channel: Pax Pentest » Exploit
Viewing all articles
Browse latest Browse all 51

The odd paucity of Cisco exploit research

$
0
0

It’s a strange thing. I can find voluminous exploit research in books and online on every topic under the sun; on every platform, covering all manner of software and hardware, with the exception of Cisco.

If you do the research on Cisco, obviously there’s the routine announcements relating to recently reported vulnerabilities and patching and so forth, but very little on exploit techniques and mitigation relating to the Cisco IOS.

The above is not strictly true.

Around 2006 a book was published by Hacking Exposed focusing exclusively on Cisco and there are bits and pieces online, but they’re all from this same period. If you’re prepared to spend time mining information, you can find the odd obscure proof-of-concept underground piece on Tcl worms, backdoors, trojans, rootkits etc, relating to Cisco, but that’s it.

Obviously reverse-engineering Cisco is prohibited and so I appreciate the fact not many folk are going to risk publishing their endeavours.

One name comes up repeatedly in terms of Cisco vulnerabilities, exploits etc ,and that is FX. I featured a video of his on this blog, but even his published work seems to be based around the 2006/8 mark.

So, I thought who better to ask about this strange paucity of research than FX himself:

 

When you consider the importance of Cisco as a network hardware/software backbone; important enough for security agencies to allegedly intercept and implant covert firmware, this all seems very odd indeed.


Viewing all articles
Browse latest Browse all 51

Trending Articles