Further study

Many discussions of potential exploits for IOS exist. The general techniques are discussed in “The Shell Coder’s Handbook” (Wiley).

A good introduction is given in “Killing the myth of Cisco IOS rootkits: DIK (Da Ios rootKit)” (Sebastian Muñiz)

For balance, you should read “Rootkits on CISCO IOS devices” Cisco document ID: 582. This provides background information on how to do QA on your CISCO software images.

Any security professional should also review “Cisco Guide to Harden Cisco IOS Devices” Cisco document ID: 13608, or more correctly, chase down the specific manual for the device and software release you are using.

Read an analysis of IOS issues

It is not just CISCO; similar techniques will apply to other equipment. Techniques are in the wild for hacking SOHO devices, as an example see “Owning the Network: Adventures in Router Rootkits” (Michael Coppola, DEFCON 2012).

At the enterprise level, we centralize authentication, authorization and accounting (AAA) and use a centralized server and services, no local accounts. Do a search on the Cisco command aaa new-model and make sure you understand the issues and the terminology.

Last updated