<<<
Date Index
>>>
<<<
Thread Index
>>>
Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques
To
: "Andy Davis" <
andy.davis@xxxxxxxxxx
>, <
bugtraq@xxxxxxxxxxxxxxxxx
>
Subject
: Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques
From
: "Halvar Flake" <
halvar.flake@xxxxxxxxxxxxxxxxxx
>
Date
: Fri, 12 Oct 2007 08:32:17 +0200
List-help
: <
mailto:bugtraq-help@securityfocus.com
>
List-id
: <bugtraq.list-id.securityfocus.com>
List-post
: <
mailto:bugtraq@securityfocus.com
>
List-subscribe
: <
mailto:bugtraq-subscribe@securityfocus.com
>
List-unsubscribe
: <
mailto:bugtraq-unsubscribe@securityfocus.com
>
Mailing-list
: contact
bugtraq-help@xxxxxxxxxxxxxxxxx
; run by ezmlm
References
: <
7B01ACCEDD4FFE48B12A55E2DB16A9301D83B5@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
>
Hey Andy,
thanks. So the core of IRMs work is "ways of getting a Cisco shell over the
network
with a small/minimal number of hardcoded addresses" ? Cheers, Halvar
Follow-Ups
:
RE: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques
From:
Andy Davis
References
:
RE: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques
From:
Andy Davis
Prev by Date:
Re[2]: [Full-disclosure] URI handling woes in Acrobat Reader, Netscape, Miranda, Skype
Next by Date:
Re: Vulnerabilities
Previous by thread:
RE: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques
Next by thread:
RE: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques
Index(es):
Date
Thread