IRM Demonstrates Multiple Cisco IOS Exploitation Techniques
- From: "Andy Davis" <andy.davis@xxxxxxxxxx>
- Date: Wed, 10 Oct 2007 11:27:20 +0100
In August 2005 at Black Hat Las Vegas, Michael Lynn delivered his
infamous presentation entitled "Cisco IOS Shellcode and Exploitation
Techniques". For the first time ever, remote exploitation of Cisco IOS
was publicly demonstrated using shellcode that spawned a connect-back or
"reverse" shell. His shellcode was never released outside Cisco.
Over the last few months IRM have been researching the security of Cisco
IOS which has resulted in the discovery of a series of serious security
vulnerabilities (including three new stack overflows). Advisories and
associated IOS patches will be released over the coming months, starting
with the first - a co-ordinated release between IRM and Cisco at 12:00
EST today (http://www.irmplc.com/index.php/107-Advisories)
During the research, three shellcode payloads for IOS exploits were
developed - a "reverse" shell, a password-protected "bind" shell and
another "bind" shell that is achieved using only two 1-byte memory
overwrites. IRM have produced videos demonstrating each of these
payloads in action within a development environment. They can be viewed
- Prev by Date: Black Hat Tokyo + DC and Europe CfPs now open.
- Next by Date: Help needed in TFTP32v1.3 BO
- Previous by thread: Black Hat Tokyo + DC and Europe CfPs now open.
- Next by thread: Help needed in TFTP32v1.3 BO