[NANOG] IOS rootkits
tvarriale at comcast.net
Fri May 16 22:57:34 CDT 2008
IIRC, the toolkit(s) can only be installed once having priv 15 on the
If this is the case, the practicality of this is...well...not that
I do think the significance is that we are getting closer and closer to
treating infrastructure devices as end stations with respect to
Looking forward to seeing all the details.
Gadi, have fun :)
----- Original Message -----
From: "Gadi Evron" <ge at linuxbox.org>
To: <nanog at merit.edu>
Sent: Friday, May 16, 2008 8:06 PM
Subject: [NANOG] IOS rootkits
> At the upcoming EusecWest Sebastian Muniz will apparently unveil an IOS
> rootkit. skip below for the news item itself.
> We've had discussions on this before, here and elsewhere. I've been
> heavily attacked on the subject of considering router security as an issue
> when compared to routing security.
> I have a lot to say about this, looking into this threat for a
> few years now and having engaged different organizations within Cisco on
> the subject in the past. Due to what I refer to as an "NDA of
> honour" I will just relay the following until it is "officially" public,
> then consider what should be made public, including:
> 1. Current defense startegies possible with Cisco gear
> 2. Third party defense strategies (yes, they now exist)
> 2. Cisco response (no names or exact quotes will likely be given)
> 3. A bet on when such a rootkit would be public, and who won it
> (participants are.. "relevant people").
> "A security researcher has developed malicious rootkit software for
> Cisco's routers, a development that has placed increasing scrutiny on the
> routers that carry the majority of the Internet's traffic.
> Sebastian Muniz, a researcher with Core Security Technologies, developed
> the software, which he will unveil on May 22 at the EuSecWest conference
> in London. "
> Gadi Evron.
> NANOG mailing list
> NANOG at nanog.org
More information about the NANOG