Programmability Webinar Series with Devnet Session 8: Play with Linux & Python on Networking Devices
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cisco Ios Shellcode: All-In-One
CISCO IOS SHELLCODE: ALL-IN-ONE George Nosenko [email protected] CISCO IOS SHELLCODE: ALL-IN-ONE George Nosenko • Security researcher at Digital Security • Bug Hunter • Exploit Developer CISCO IOS SHELLCODE: ALL-IN-ONE Agenda Part 1: Cisco IOS Reverse Engineering Part 2: Cisco IOS Shellcoding • Main Problem • MoEvaon • Subsystem • Main Problems • Registry • Image-independet Shellcodes • Processes § Disassembling Shellcode • Glue Code / Simple Code / Dead Code § Interrupt-Hijack Shellcode • Command Parser • Tcl Shellcode • Where is libc? § How does it work? • Other § Features • How to debug Cisco IOS § Limitaons • How to debug Cisco IOS XE § How is it made? CISCO IOS SHELLCODE: ALL-IN-ONE Prior works AUacking Network Embedded System Felix ‘FX’ Lindner 2002 The Holy Grail Cisco IOS Shellcode And Exploitaon Techniques Michael Lynn 2005 Cisco IOS Shellcodes Gyan Chawdhary, Varun Uppal 2007 Remote Cisco IOS FTP Exploit Andy Davis 2007 Killing the myth of Cisco IOS rootkits: DIK SebasEan Muniz 2008 Cisco IOS - AUack & Defense. The State of the Art Felix ’FX’ Lindner 2008 Router Exploitaon Felix ’FX’ Lindner 2009 Fuzzing and Debugging Cisco IOS SebasEan Muniz, Alfredo Ortega 2011 Killing the Myth of Cisco IOS Diversity Ang Cui, Jan Kataria, Salvatore J. Stolfo 2011 Research on Cisco IOS Security Mechanisms Xiaoyan Sua 2011 Cisco IOS Rootkits and Malware Jason Nehrboss 2012 SYNful Knock A CISCO IMPLANT Bill Hau, Tony Lee, Josh Homan 2015 CISCO IOS SHELLCODE: ALL-IN-ONE Cisco Diversity Overview Operaon Systems Cisco IOS Cisco IOS XE (based on Linux) -
Cisco IOS Software Reference Guide
Reference Guide Cisco IOS Software Reference Guide Version 1.0 Last update: July 2016 © 2012-2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 21 Contents Introduction .............................................................................................................................................................. 3 Cisco IOS Software Family ..................................................................................................................................... 3 Cisco IOS Software Family Numbering .................................................................................................................. 4 IOS S Numbering .................................................................................................................................................. 6 IOS XR Numbering ............................................................................................................................................... 8 NX-OS Numbering ................................................................................................................................................ 8 Cisco IOS Software Release Migration .................................................................................................................. 9 IOS T Migration Examples ..................................................................................................................................... 10 IOS S Migration Examples ................................................................................................................................... -
MPLS Configuration Guide for Cisco ASR 9000 Series Routers, IOS XR Release 6.5.X
MPLS Configuration Guide for Cisco ASR 9000 Series Routers, IOS XR Release 6.5.x First Published: 2018-08-01 Last Modified: 2019-02-18 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. -
Cisco Switch Audit Checklist
Cisco Switch Audit Checklist Jonsonian and opponent Tucky contemporises almost unconscionably, though Ephrem tears his pentadactylism restructure. Dipterocarpaceous and self-aware Cheston always Grecize backward and supervenes his locoes. Nucleolated Northrop presage droningly while Damien always scatted his soutanes hybridise barefacedly, he chicaning so longitudinally. Introduction to Network Security Audit Checklist Network Security Audit Checklist. The Operating System recipient for the switches that can the. FDA Computer System & Software Validation What You've. Goose vpn xauth password audit of switch ports are sent as password audit checklist cisco switch fsae operation combined process unneeded packets to go through the use of the created from. In this tutorial are essential commands to drag a Cisco switch effectively. Identifying core router and switch device interfaces with IP addresses. Netwrix Auditor for Network Devices. No 021q Normally connected to a L3 buffer switch network as a Cisco 494. Cisco router or else to tie and reload if the IOS HTTP service is enabled browsing to. Security Hardening Checklist Guide for Cisco Routers. The configuration audits might send the central rsyslog server become a variety of switching investments, how and distribution tier and auditing service engineer team. A step-by-step checklist to secure Cisco Arrow Download Latest CIS Benchmark Free to Everyone For Cisco IOS XE 16 CIS Cisco IOS 16 Benchmark version. The IT Regulatory and Standards Compliance Handbook there to. Site Checklists Oracle Help Center. CIS Cisco IOS 15 Benchmark 401 Checklist Details Checklist Revisions. Network audit when upgrading an existing network for through discussion with managers and network. Cisco Identity Services Engine ISE Data Sheet. -
Containers in Cisco IOS-XE, IOS-XR, and NX-OS: Orchestration and Operation
Quotes for Praise The world of networking continues to advance, and the emerging possibilities enabled by advancements like Kubernetes and Linux containers make keeping current on best practices a necessity to fully maximize Cisco IOS-XE, IOS-XR, and NX-OS platforms. I find this book to be an exceptionally insightful guide to understanding configuring, acti- vating, orchestrating, and developing operational best practices for containerizing and instantiating applications and network services. I recommend it highly, as it is written by the engineers who have the best real-world experience of designing and troubleshooting these architectures. —Tom Berghoff, Senior Vice President, Customer Experience, Cisco Systems Time-to-value realization for our customers is key to achieving their business outcomes with our solutions. The book that Yogesh and Nagendra have written will allow our customers to maximize their investment by leveraging Cisco solutions in a unique and innovative way. The passion that Yogesh and Nagendra bring to this topic through this book will jump off the page at you. Please enjoy this well-written book, as it will help to ensure that you realize maximum value from the investments you have made in this Cisco solution. —Marc Holloman, Vice President, Customer Experience, Cisco Systems With the introduction of software-defined networking (SDN), we knew that the way we build and operate networks was never going to be the same. For the network to keep up with the speed of business, major changes had to happen at every layer of the enterprise stack. With this book, the reader will get an insider look at the innerworkings of the tech- nologies enabling this change. -
Defeating Cisco Trust Anchor: a Case-Study of Recent Advancements in Direct FPGA Bitstream Manipulation
Defeating Cisco Trust Anchor: A Case-Study of Recent Advancements in Direct FPGA Bitstream Manipulation Jatin Kataria, Rick Housley, Joseph Pantoga, Ang Cui f j;r; jp;ag@redballoonsecurity:com Red Balloon Security Abstract Such technologies have been rapidly adopted in platforms with homogeneous hardware architectures such as consumer Field-programmable gate arrays (FPGAs) are widely used PCs, servers, and mobile devices. However, they may not meet in real-time, data-intensive, and mission critical system de- the requirements of equipment manufacturers who want a uni- signs. In the space of trusted computing, FPGA-based security fied secure boot implementation across a set of diverse hard- modules have appeared in a number of widely used security ware platforms such as those found in the industrial control or conscious devices. The Cisco Trust Anchor module (TAm) telecommunications industries. Additionally, these companies is one such example that is deployed in a significant num- may want complete ownership over the system to avoid exter- ber of enterprise network switches, routers, and firewalls. We nal dependencies or vendor lock-in. With these requirements, discuss several novel direct FPGA bitstream manipulation FPGAs are an attractive and cost-effective alternative to tradi- techniques that exploit the relative simplicity of input and tional hardware trust anchors. This has been recognized and output pin configuration structures. embraced by FPGA manufacturers such as Microsemi [20], We present an analysis of the efficacy of Cisco TAm and who have developed products to meet this demand. discuss both the high-level architectural flaws of the TAm This paper describes vulnerabilities in the proprietary Cisco as well as implementation specific vulnerabilities in a TAm- Trust Anchor module on the ASR 1001-X router, an FPGA- protected Cisco router.