Priscilla Oppenheimer wrote:
> 
> Priscilla Oppenheimer wrote:
> > 
> > On Catalyst switches, you can use the "set port host" macro.
> It
> > turns a bunch of stuff off.
> > 
> > That won't help with HSRP, though. HSRP is definitely
> hackable.
> > If you can see the packets, you can see the unencrypted
> > authentication string, and then you can claim to be the active
> > router yourself and all traffic will go to you instead of
> where
> > it should go. I've done it! :-)
> > 
> > You should check to see if Cisco ever fixed this, though.
> Maybe
> > they use a stronger authenticaton method now. I'll see if I
> can
> > find out.....
> 
> They don't seem to have fixed this! Unbelievable. It's a gaping
> hole, (although to exploit it you have to have access to the
> LAN.)
> 
> P.
> 
> > 
> > _______________________________
> > 
> > Priscilla Oppenheimer
> > www.troubleshootingnetworks.com
> > www.priscilla.com
> > 
> > 
> > 

Thanks Priscilla.  I found it interesting that the security consultants made
note of these "findings" and made a strong recommendation that we fix them. 
No suggestions on how to do so were offered.  I imagine there is a L2 ACL
solution or something along those lines.  I was hoping for something clean,
but I guess it's time to earn our paycheck.

Regards,

Scott


Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=61814&t=61796
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to