Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
Security

Submission + - Cisco IOS Exploitation Techniques (net-security.org)

An anonymous reader writes: It's been almost two years since Michael Lynn demonstrated a reliable code execution exploit on Cisco IOS. Although his presentation received a lot of media coverage in the security community, very little is known about the attack and the technical details surrounding the IOS check_heaps() vulnerability. This paper is a result of research carried out by IRM to analyse and understand the check_heaps() attack and its impact on similar embedded devices. Furthermore, it also helps developers understand security-specific issues in embedded environments and developing mitigation strategies for similar vulnerabilities.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Cisco IOS Exploitation Techniques

Comments Filter:

10 to the minus 6th power mouthwashes = 1 Microscope

Working...