Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - Cisco IOS Exploitation Techniques->

Submitted by Anonymous Coward
An anonymous reader writes "It's been almost two years since Michael Lynn demonstrated a reliable code execution exploit on Cisco IOS. Although his presentation received a lot of media coverage in the security community, very little is known about the attack and the technical details surrounding the IOS check_heaps() vulnerability. This paper is a result of research carried out by IRM to analyse and understand the check_heaps() attack and its impact on similar embedded devices. Furthermore, it also helps developers understand security-specific issues in embedded environments and developing mitigation strategies for similar vulnerabilities."
Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Cisco IOS Exploitation Techniques

Comments Filter:

Committees have become so important nowadays that subcommittees have to be appointed to do the work.

Working...