Re: [c-nsp] Obtaining MD signature

2010-05-08 Thread Gert Doering
Hi, On Fri, May 07, 2010 at 08:17:15PM -0700, Judah Scott wrote: But, I don't think you can compare enabling features (possibly as simple as changing a couple je ops to jmp ops or a couple bytes here/there) to writing a whole block of IOS assembly code to facilitate a backdoor ... ... but,

[c-nsp] Obtaining MD signature

2010-05-07 Thread Rick Kunkel
Possibly OT, as it doesn't stricly pertain to networking... Apologies, if regarded as such... The SOLE copy I've got of s72033-adventerprisek9_wan-mz.122-18.SXF4.bin resides on a TFTP server used for backup purposes. This TFTP server experienced disk issues a year or so ago, and I'm not

Re: [c-nsp] Obtaining MD signature

2010-05-07 Thread Alan Buxey
Hi, The SOLE copy I've got of s72033-adventerprisek9_wan-mz.122-18.SXF4.bin resides on a TFTP server used for backup purposes. This TFTP server cant you just copy it onto a sup720 flash drive - eg disk0: and run verify s72033-adventerprisek9_wan-mz.122-18.SXF4.bin ? alan

Re: [c-nsp] Obtaining MD signature

2010-05-07 Thread Church, Charles
/tsweb/psirt/cisco-sr-20080516-rootkits-r2.4.zip Chuck -Original Message- From: cisco-nsp-boun...@puck.nether.net [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Alan Buxey Sent: Friday, May 07, 2010 2:42 PM To: Rick Kunkel Cc: cisco-nsp@puck.nether.net Subject: Re: [c-nsp] Obtaining

Re: [c-nsp] Obtaining MD signature

2010-05-07 Thread Gert Doering
Hi, On Fri, May 07, 2010 at 10:45:24AM -0700, Rick Kunkel wrote: The SOLE copy I've got of s72033-adventerprisek9_wan-mz.122-18.SXF4.bin resides on a TFTP server used for backup purposes. This TFTP server There's two ways here. a) you could upload the software on a router, and ask the

Re: [c-nsp] Obtaining MD signature

2010-05-07 Thread Rick Kunkel
I've actually done this, yes... But my impression was that I needed to check it against Cisco's site as well... Ah... wait.. I am beginning to see... The embedded hash is PART of the file, and is used for this verification purpose. I *HAD* thought that the CCO hash was perhaps the one from

Re: [c-nsp] Obtaining MD signature

2010-05-07 Thread Judah Scott
Of course one -could- do this. IMO it's not even a -decent- way to exploit considering to implement this one already needs CF access (as super-user or physically) and to reload the router with the compromised image. Distributing compromised images isn't all that useful either because it will be

Re: [c-nsp] Obtaining MD signature

2010-05-07 Thread Jared Mauch
On May 7, 2010, at 4:48 PM, Judah Scott wrote: Distributing compromised images isn't all that useful either because it will be difficult to track down which routers the backdoors (presumably thats what a compromised image would go for) were installed to unless they send out packets notifying

Re: [c-nsp] Obtaining MD signature

2010-05-07 Thread Judah Scott
You got me on the packet cops argument. But, I don't think you can compare enabling features (possibly as simple as changing a couple je ops to jmp ops or a couple bytes here/there) to writing a whole block of IOS assembly code to facilitate a backdoor ... ... but, uh oh, my ignorance is showing