Bugtraq mailing list archives
Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques
From: "Halvar Flake" <halvar.flake () sabre-security com>
Date: Fri, 12 Oct 2007 08:32:17 +0200
Hey Andy,thanks. So the core of IRMs work is "ways of getting a Cisco shell over the network
with a small/minimal number of hardcoded addresses" ? Cheers, Halvar
Current thread:
- Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Damir Rajnovic (Oct 10)
- Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Halvar Flake (Oct 10)
- RE: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Andy Davis (Oct 11)
- Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Halvar Flake (Oct 11)
- RE: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Andy Davis (Oct 11)
- Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Halvar Flake (Oct 11)
- Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Roman Medina-Heigl Hernandez (Oct 12)
- Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Mark Senior (Oct 12)
- RE: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Andy Davis (Oct 11)
- Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Halvar Flake (Oct 10)
- <Possible follow-ups>
- RE: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Andy Davis (Oct 16)