Oct
4
2010
Cisco Packet Tracer 5.2 DLL Hijacking Exploit
cisco-exploit

Untrusted search path vulnerability in Cisco Packet Tracer 5.2 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wintab32.dll that is located in the same folder as a .pkt or .pkz file. The vulnerability is caused due to the application loading libraries (e.g. wintab32.dll) in an insecure manner. The program uses a fixed path to look for specific files or libraries. This path includes directories that may not be trusted or under user control. By placing a custom version of the file or library in the path, the program […]

Oct
2
2010
September 2010: seven Cisco vulnerabilities
Cisco-vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published seven important vulnerability advisories: Cisco IOS Software H.323 Denial of Service Vulnerabilities Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerabilities Cisco IOS Software Internet Group Management Protocol Denial of Service Vulnerability Cisco IOS Software Network Address Translation Vulnerabilities Cisco IOS SSL VPN Vulnerability Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerabilities Multiple Vulnerabilities in Cisco Wireless LAN Controllers

Oct
1
2010
New style for Ciscozine.com
New-style-for-Ciscozine

After 2 years, I have decided to change the style of CiscoZine. I hope that you appreciate it! If you find some CSS, JS or HTML errors advise me by means of the form below. Don’t remember to follow me on Youtube, Linkedin, FeedBurner, Twitter and Facebook too! Ah, don’t forget to see Ciscozine via smartphone, iPhone or other mobile devices with the new design :-) Enjoy it!

Sep
29
2010
Cisco regular expressions
Using-regular-expressions-with-the-Show-command

The origins of regular expressions lie in automata theory and formal language theory, both of which are part of theoretical computer science. These fields study models of computation (automata) and ways to describe and classify formal languages. In the 1950s, mathematician Stephen Cole Kleene described these models using his mathematical notation called regular sets. The SNOBOL language was an early implementation of pattern matching, but not identical to regular expressions. Ken Thompson built Kleene’s notation into the editor QED as a means to match patterns in text files. A regular expression is entered as part of a command and is […]

Sep
27
2010
Cisco has acquired ExtendMedia
Cisco-has-acquired-ExtendMedia

On September 23 2010, Cisco announced it has completed its acquisition of privately-held ExtendMedia, a leading provider of software-based Content Management Systems (CMS) that manage the entire lifecycle of video content through monetization for pay media and ad-supported business models. Based in Newton, Mass., with the majority of its employee base in Toronto, Canada, ExtendMedia enables Cisco to help service providers deliver multi-screen offerings as the market transitions to IP video. “As the video market transitions and consumers expect multi-screen engagement, service providers are enhancing their infrastructure to manage and deliver video to any device while providing a rich user […]

Sep
23
2010
Cisco AnyConnect for the iPhone
AnyConnect-iphone-3

Three days ago, Cisco has released the Cisco AnyConnect Secure Mobility Client for the iPhone (iOS 4), but what is it? The Cisco AnyConnect Secure Mobility Client provides remote users with secure VPN connections to the Cisco ASA 5500 Series using the Secure Socket Layer (SSL) protocol and the Datagram TLS (DTLS) protocol. The Cisco AnyConnect Secure Mobility Client for Apple iOS provides seamless and secure remote access to enterprise networks. The client provides a full tunneling experience that allows any installed application to communicate as though connected directly to the enterprise network. It runs on Apple iOS version 4.1 […]

Sep
21
2010
Arch Rock is now part of Cisco
Arch-Rock-is-now-part-of-Cisco

Cisco has completed its acquisition of privately held Arch Rock Corporation, a pioneer in Internet Protocol-based wireless network technology for smart-grid  applications.  Based in San Francisco, Arch Rock will accelerate Cisco’s ability to facilitate the utility industry’s transition to an open and interoperable smart grid by enabling Cisco to offer a comprehensive and highly secure advanced metering infrastructure solution that is fully IP and open-standards based. “Arch Rock’s wireless mesh technology enhances Cisco’s IP-based, end-to-end smart-grid offerings,” said Laura Ipsen, senior vice president and general manager of Cisco’s Smart Grid business unit. “This acquisition further positions Cisco as a strategic […]

Sep
20
2010
Cisco IOS Keyboard Shortcuts
Cisco-IOS-Keyboard-Shortcuts

A number of shortcuts exist within the IOS command line interface. The most famous shortcut is the ‘TAB’ command, that completes a partially typed CLI command. For istance, if you type “sh ru” and press TAB, it will complete the command as “show running-config“. Below the complete list of the IOS shortcuts: Ctrl+T: Swap the current character with the one before it Ctrl+K: Erase all characters from the current cursor position to the end of the line Ctrl+X: Erase all characters from the current cursor position to the beginning of the line Ctrl+L: Reprint the line Ctrl+C: Exit configuration mode

Sep
6
2010
July & August 2010: ten Cisco vulnerabilities
Cisco-vulnerabilities

The The Cisco Product Security Incident Response Team (PSIRT) has published ten important vulnerability advisories: Cisco IOS XR Software Border Gateway Protocol Vulnerability Cisco Unified Communications Manager Denial of Service Vulnerabilities Cisco Unified Presence Denial of Service Vulnerabilities Cisco IOS Software TCP Denial of Service Vulnerability Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine SQL Injection Vulnerability in Cisco Wireless Control System Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances Multiple Vulnerabilities in Cisco Firewall Services Module CDS Internet Streamer: Web Server Directory Traversal Vulnerability Hard-Coded SNMP Community Names […]

Jul
13
2010
Hub & Spoke: an example of VRF-Lite
vrf-lite-virtual-connection

VRF is an extension of IP routing that provides multiple routing instances. It provides a separate IP routing and forwarding table to each VPN and is used in concert with MP-iBGP (Multi-Protocol internal BGP) between provider equipment (PE) routers to provide Layer 3 MPLS-VPN. However, ML-Series VRF implementation is without MP-iBGP. With VRF Lite, the ML Series is considered a PE-extension or a customer equipment (CE)-extension. VRF Lite is considered a PE-extension since its has VRF (but without MP-iBGP), and it is considered a CE-extension since this CE can have multiple VRFs and serves many customer with one CE box. […]

Pages:«1...11121314151617...27»