Penetration Testing mailing list archives
Re: [PEN-TEST] RIP & OSPF testing
From: Dug Song <dugsong () MONKEY ORG>
Date: Sat, 25 Nov 2000 16:37:23 -0500
On Sat, Nov 25, 2000 at 05:19:25PM -0000, Curt Wilson wrote:
I'm looking for information that goes beyond the usual router exploits such as weak SNMP community names, bad choices for enable password, bad or no egress/ingress filtering, etc. I really want to dig into the protocol level.
i'd be extremely careful with this. perturbing the network with some
simple scans or sniffing for secrets is one thing; segmenting the
network with bad routing updates or advertisements is something else
altogether.
and in the worst case, your "tests" may have catastrophic effects well
beyond the customer's immediate network, e.g. BGP updates rippling out
across the Internet, routing arbiter or no. unless you *really*
understand what you're doing, playing with fault injection in routing
protocols on the public Internet is a Really Bad Idea.
see Craig Labovitz's recent work on routing stability for more info:
http://research.microsoft.com/users/labovit/
-d.
---
http://www.monkey.org/~dugsong/
Current thread:
- [PEN-TEST] RIP & OSPF testing Curt Wilson (Nov 26)
- Re: [PEN-TEST] RIP & OSPF testing Dug Song (Nov 26)
- <Possible follow-ups>
- Re: [PEN-TEST] RIP & OSPF testing J. Oquendo (Nov 27)
- Re: [PEN-TEST] RIP & OSPF testing NetW3.COM Consulting (Nov 27)
- Re: [PEN-TEST] RIP & OSPF testing DA Smith (Nov 28)
- Re: [PEN-TEST] RIP & OSPF testing batz (Nov 28)
- Re: [PEN-TEST] RIP & OSPF testing J. Oquendo (Nov 27)
