I demonstrated such a technique in my SANS GCIH practical, available at http://www.giac.org/practical/Joshua_Wright_GCIH.zip (MS Word). Set up a GRE tunnel to a router you control to start sniffing some traffic. This does not establish a man-in-the-middle scenario as the traffic would be asymmetrical in nature, but lets you glean all kinds of useful information (see section D8 in my paper).
Also see the Phrack 56 article "Things To Do In Cisco Land When You Are Dead" (Gaius). My paper was never widely received, so I certainly appreciate any comments on its content. Thanks. -Joshua Wright Team Leader, Networks and Systems Johnson & Wales University [EMAIL PROTECTED] pgpkey: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xD44B4A73 fingerprint: FDA5 12FC F391 3740 E0AE BDB6 8FE2 FC0A D44B 4A73 > Performing a pen-test on a class C network, and I've gained > privileged access to the main router on the client's network. > Are there any other tricks I can do with admin access (aside > from obvious DoS attacks) to the external router? For > clarification, I have the Cisco 2600 privileged password and > can telnet to the router remotely. ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
