exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 1 of 1 RSS Feed

Files

Creating_Backdoors_in_Cisco_IOS_using_Tcl.pdf
Posted Nov 28, 2007
Authored by Andy Davis - IRMPLC | Site irmplc.com

This short technical briefing describes a technique using Tcl to create a backdoor within IOS that would allow a remote attacker to execute privileged commands on a networking device.

tags | paper, remote
systems | cisco
SHA-256 | e9a229bcf26b8163b934b676f8f37dbddfc8bbc6aca0bc911d5d89e8d262262e
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close