SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Cisco Systems, Inc. (CSCO)
CSCO 77.99-0.2%3:59 PM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: RetiredNow who wrote (68385)8/3/2005 2:44:29 PM
From: pfalk  Read Replies (1) of 77400
 
I saw the presentation slides. What those slides covered wasn't really what has been reported at all. The slides that I say was mostly a reverse engineering of Cisco's IOS, showing the actual code, and outlining how you'd defeat certain safeguards. The "problem" was that you had to "own" the router before you could do any of these things. I.e. this showed you how to break into your own router. Why would you do that, you already had full control of it?

The only reason I could see was if you wanted to clone IOS for your own product, or if you wanted to use your own router to develop worms for routers.

The article also pointed out that whatever offsets etc. you found, would most likely only be applicable to "your" particular router, i.e. you couldn't exploit whatever weakness you might find for other routers, unless it was an identical router, running exactly the same build of IOS (not just the same feature, but the same compile date too).

Either there were two presentations, or this was merely a discussion of how to reverse engineer IOS.

P
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext