"That peer-review is the basic purpose of my Blackhat talk and the associated paper. I plan to review Cisco’s architecture for lawful intercept and explain the approach a bad guy would take to getting access without authorization. I’ll identify several aspects of the design and implementation of the Lawful Intercept (LI) and Simple Network Management Protocol Version 3 (SNMPv3) protocols that can be exploited to gain access to the interface, and provide recommendations for mitigating those vulnerabilities in design, implementation, and deployment."

More here:
http://blogs.iss.net/archive/blackhatlitalk.html

        Gadi.



--
Gadi Evron,
g...@linuxbox.org.

Blog: http://gevron.livejournal.com/

Reply via email to