Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations
-original message- Subject: Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations From: "andrew.wallace" <andrew.wallace@rocketmail.com> Date: 04/02/2010 11:09 pm On Thu, Feb 4, 2010 at 8:19 PM, Gadi Evron <ge@linuxbox.org> wrote:
"That peer-review is the basic purpose of my Blackhat talk and the associated paper. I plan to review Cisco’s architecture for lawful intercept and explain the approach a bad guy would take to getting access without authorization. I’ll identify several aspects of the design and implementation of the Lawful Intercept (LI) and Simple Network Management Protocol Version 3 (SNMPv3) protocols that can be exploited to gain access to the interface, and provide recommendations for mitigating those vulnerabilities in design, implementation, and deployment."
More here: http://blogs.iss.net/archive/blackhatlitalk.html
Gadi.
For the sake of clarity and transparency, Gadi Evron has absolutely no connection to this research whatsoever. He is famous in the security community for piggybacking off other peoples research. We are frustrated with him as much as we are annoyed. Andrew Security consultant CITATION NEEDED
On Thu, Feb 4, 2010 at 11:25 PM, <a.harrowell@gmail.com> wrote:
-original message- Subject: Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations From: "andrew.wallace" <andrew.wallace@rocketmail.com> Date: 04/02/2010 11:09 pm
On Thu, Feb 4, 2010 at 8:19 PM, Gadi Evron <ge@linuxbox.org> wrote:
"That peer-review is the basic purpose of my Blackhat talk and the associated paper. I plan to review Cisco’s architecture for lawful intercept and explain the approach a bad guy would take to getting access without authorization. I’ll identify several aspects of the design and implementation of the Lawful Intercept (LI) and Simple Network Management Protocol Version 3 (SNMPv3) protocols that can be exploited to gain access to the interface, and provide recommendations for mitigating those vulnerabilities in design, implementation, and deployment."
More here: http://blogs.iss.net/archive/blackhatlitalk.html
Gadi.
For the sake of clarity and transparency,
Gadi Evron has absolutely no connection to this research whatsoever.
He is famous in the security community for piggybacking off other peoples research.
We are frustrated with him as much as we are annoyed.
Andrew
Security consultant
CITATION NEEDED
You can goto Full-disclosure mailing list http://www.grok.org.uk/full-disclosure/ and ask about "Gadi Evron". There will be plenty folks there who will tell you he is involved in plagiarism. Andrew Security consultant
On 04/02/10 15:58 -0800, andrew.wallace wrote:
CITATION NEEDED
You can goto Full-disclosure mailing list http://www.grok.org.uk/full-disclosure/ and ask about "Gadi Evron".
There will be plenty folks there who will tell you he is involved in plagiarism.
Andrew
Security consultant
That's not a reference. And it reeks of security-consultant-gamesmanship. If you've had a look at Gadi's paper that he intends to present, then discuss with him where you feel he's infringing. -- Dan White
Andrew
Security consultant
CITATION NEEDED
You can goto Full-disclosure mailing list http://www.grok.org.uk/full-disclosure/ ...
Andrew
Security consultant
For "clarity and transparency" you were banned from that list for trolling under the persona "n3td3v". -- bk
----- Original Message ---- From: Brian Keefer <chort@smtps.net> To: NANOG list <nanog@nanog.org> Cc: a.harrowell@gmail.com; andrew.wallace <andrew.wallace@rocketmail.com> Sent: Fri, 5 February, 2010 1:55:58 Subject: Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations
Andrew
Security consultant
CITATION NEEDED
You can goto Full-disclosure mailing list http://www.grok.org.uk/full-disclosure/ ...
Andrew
Security consultant
For "clarity and transparency" you were banned from that list for trolling under the persona "n3td3v". -- bk "n3td3v" isn't a persona, its my username and the name of the security & intelligence group I am the founder of. If you do think I am a troll I will happily discuss with you off-list what part of me you think is a troll because I have never trolled I am a deadly serious person. I will happily arrange a meeting with you so we can discuss this further, Andrew Security consultant
participants (4)
-
a.harrowell@gmail.com
-
andrew.wallace
-
Brian Keefer
-
Dan White