Penetration Testing mailing list archives

Re: Attacking TACACS


From: lists () packetfocus com
Date: 26 Jul 2006 07:43:05 -0000

Hey Mike,

DoS it :) 

  Cisco devices should have a secondary login stored locally if they can't reach the TACACS server. You can test this 
my flooding the port. UDPFlood so on. This could also test for security setting on the Cisco Gear.

 - TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to Unix 
networks that allows a remote access server to forward a user's logon password to an authentication server to determine 
whether access can be allowed to a given system. TACACS is an encryption protocol and therefore less secure than the 
later TACACS+ and Remote Authentication Dial-In User Service protocols. A later version of TACACS is XTACACS (Extended 
TACACS). Both are described in Request for Comments 1492.

Josh Perrymon
CEO
Packetfocus.com

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: