Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

A credible plan to take down the Internet

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
Home » Discuss » DU Groups » Computers & Internet » Open Source and Free Software Group Donate to DU
 
Old and In the Way Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-10-05 11:56 AM
Original message
A credible plan to take down the Internet
I thought this article might be of interest to the DU community. I don't think CNET is a wacko source for computer/internet security issues.

I wasn't sure where to post this, so here it is:

A credible plan to take down the Internet
By Robert Vamosi
Senior editor, CNET Reviews
August 5, 2005


Forget the Fantastic Four. As I write, the forces of Good (the White Hats) and Evil (the Black Hats) are fighting for control of the Internet as we know it. At stake is the exploitation of flaws affecting the once-invincible Cisco router hardware, which currently carries most of the Internet's traffic on a daily basis. Once a working exploit for the Cisco IOS Shellcode is available on the Internet, it'll be only a matter of days before someone finds a way to craft it into a network worm. And then it's going to be a rough ride for everyone who uses the Internet. Unless, of course, the forces of Good prevail.

Hyperbole? Perhaps, but a credible threat to the infrastructure of the Internet does exist. All indications suggest that the clock is ticking toward some kind of showdown between criminal hackers and the good guys. Unfortunately, the bad guys have a head start.

At stake is the exploitation of flaws affecting the once-invincible Cisco router hardware, which currently carries most of the Internet's traffic on a daily basis.

The threat
Prior to this year's Black Hat security conference, security researchers and network administrators assumed that Cisco routers were invincible, a reputation that surely helped lead to the widespread adoption of Cisco routers across the Internet. The Cisco operating system is proprietary, and much of the specific internal hardware in the Cisco router is undocumented. Until recently, the idea of penetrating the Cisco Shellcode via remote access was fanciful. That was before security researcher Michael Lynn stepped up the lectern at this year's Black Hat conference, and after first stumbling through a deliberately faux presentation on VoIP security, proceeded to describe some (but not all) of his research to a skeptical audience. During his presentation, Lynn offered a quick demo of how he could access the root of a Cisco router remotely. Like the first runner breaking the four-minute-mile mark, Lynn emboldened other researchers to go out and see for themselves.

<snip>

Article here:

http://reviews.cnet.com/4520-3513_7-6282711-1.html?tag=nl.e497

Refresh | 0 Recommendations Printer Friendly | Permalink | Reply | Top
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-10-05 01:28 PM
Response to Original message
1. Sounds like Cisco had a good deal of security through obscurity.
Which has now been compromised. I have always considered Cisco a bad solution to the routing problem, but perhaps I don't know all I ought about that. Nevertheless, routing is a fairly simple problem, packets come in and you do one of a small number of things with them, all in the kernel one would hope. There is no need for any open ports at all, and that would be the most secure situation. That being so, any machine with a secure TCP/IP stack configured with no open ports should do the job, as long as you have the performance you need too.
Printer Friendly | Permalink | Reply | Top
 
Old and In the Way Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-10-05 02:07 PM
Response to Reply #1
2. Glad to have informed DUer's that can help me understand this stuff.
What a dn't know about digital could fill volumes....
Printer Friendly | Permalink | Reply | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-10-05 05:38 PM
Response to Reply #2
3. It's vastly overrated, I can assure you. But the money was good. nt
Printer Friendly | Permalink | Reply | Top
 
SKKY Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Aug-13-05 12:34 PM
Response to Original message
4. If you could write an exploit, a worm if you will, that could pop...
...the Cisco IOS on the level that has been done in the past with Microsoft IIS, that would be very, very, disrupting. We often talk about the concept "Defense in Depth" in Network Security, what we should be talking about is "Defense in Breadth".
Printer Friendly | Permalink | Reply | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu May 02nd 2024, 07:56 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » DU Groups » Computers & Internet » Open Source and Free Software Group Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC