[Full-disclosure] Quagga RIPD unauthenticated route injection

2006-05-02 Thread Konstantin V. Gavrilenko
Arhont Ltd - Information Security Advisory by:Konstantin V. Gavrilenko (http://www.arhont.com) Arhont ref: arh200604-2 Advisory: Quagga RIPD unauthenticated route injection Class: design bug? Version:Tested on Quagga suite v0.98.5 v0.99.3 (Gentoo, 2.6.15) Model

[Full-disclosure] Quagga RIPD unauthenticated route table broadcast

2006-05-02 Thread Konstantin V. Gavrilenko
Arhont Ltd - Information Security Advisory by:Konstantin V. Gavrilenko (http://www.arhont.com) Arhont ref: arh200604-1 Advisory: Quagga RIPD unauthenticated route table broadcast Class: design bug? Version:Tested on Quagga suite v0.98.5 v0.99.3(Gentoo, 2.6.15) Model

[Full-disclosure] Cisco PIX embryonic state machine 1b data DoS

2006-03-08 Thread Konstantin V. Gavrilenko
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Arhont Ltd - Information Security Arhont Advisory by: Konstantin V. Gavrilenko (http://www.arhont.com) http://www.hackingciscoexposed.com Arhont ref: arh200601-1 Advisory: Cisco PIX

[Full-disclosure] Cisco PIX embryonic state machine 1b data DoS

2006-03-07 Thread Konstantin V. Gavrilenko
Arhont Ltd - Information Security Arhont Advisory by: Konstantin V. Gavrilenko (http://www.arhont.com) http://www.hackingciscoexposed.com Arhont ref: arh200601-1 Advisory: Cisco PIX embryonic state machine 1b data DoS Class

[Full-disclosure] Cisco PIX embryonic state machine TTL(n-1) DoS

2006-03-07 Thread Konstantin V. Gavrilenko
Arhont Ltd - Information Security Arhont Advisory by: Konstantin V. Gavrilenko (http://www.arhont.com) http://www.hackingciscoexposed.com Arhont ref: arh200511-1 Advisory: Cisco PIX embryonic state machine TTL(n-1) DoS Class

[Full-disclosure] Hacking Exposed Cisco Networks

2005-12-20 Thread Konstantin V. Gavrilenko
S and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR * Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access * Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels I hope you enjoy the read.

[Full-disclosure] Cisco PIX TCP Connection Prevention

2005-11-22 Thread Konstantin V. Gavrilenko
Arhont Ltd.- Information Security Arhont Advisory by: Konstantin V. Gavrilenko (http://www.arhont.com) Advisory: Cisco PIX TCP Connection Prevention Class: design bug Version:Tested on PIX515E, PIX OS version 6.3(3) Model Specific: Other

Re: [Full-disclosure] Re: Hack Your Credit Card Company (OT)

2005-05-26 Thread Konstantin V. Gavrilenko
z games, ha? watch pr0n and jerk off instead of flaming the list. -- Respectfully, Konstantin V. Gavrilenko Arhont Ltd - Information Security web:http://www.arhont.com http://www.wi-foo.com e-mail: [EMAIL PROTECTED] tel: +44 (0) 870 44 31337 fax: +44 (0) 117 969 0141 PGP: Key ID

[Full-disclosure] AirJack26

2005-05-08 Thread Konstantin V. Gavrilenko
freed the Europe from the Nazi occupation, obliterating 600 divisions on the way to Berlin - POBEDA! We've tested it to work with Fatajack, WepWedgie and File2Air. p.s. Borja thanks again! -- Respectfully, Konstantin V. Gavrilenko Arhont Ltd - Information Security web:http://www.arhon

Re: [Full-disclosure] Wi-fi. Approaching customers

2005-03-16 Thread Konstantin V. Gavrilenko
What a great possibilities for remote dos. Just imagine what would happen to a finely tuned network, when attacker starts cloning the mac addresses :) -- Respectfully, Konstantin V. Gavrilenko Arhont Ltd - Information Security web:http://www.arhont.com http://www.wi-foo.com e-mail

Re: [Full-disclosure] Wi-fi. Approaching customers

2005-03-15 Thread Konstantin V. Gavrilenko
link, also you can see OSPF updates flying around ;) Some people never learn. -- Respectfully, Konstantin V. Gavrilenko Arhont Ltd - Information Security web:http://www.arhont.com http://www.wi-foo.com e-mail: [EMAIL PROTECTED] tel: +44 (0) 870 44 31337 fax: +44 (0) 117 969 0141 PGP: Key