Cisco Threatens Web Site That Leaked Exploit Presentation - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Infrastructure
News
7/29/2005
07:26 PM
50%
50%

Cisco Threatens Web Site That Leaked Exploit Presentation

Cisco sent a cease-and-desist letter to at least one Web site that posted a leaked copy of an exploit technique against its routers. The technique, which Cisco has been working to suppress in court, was demonstrated publicly at the Black Hat security conference.

Cisco stepped up its legal effort Friday against the exploit technique demonstrated at the Black Hat security conference by sending a cease-and-desist letter to at least one Web site that had posted a copy of the leaked presentation.

Late Friday afternoon, Rick Forno, a security consultant who had put a copy of Michael Lynn's briefing on his Web site had replaced the PDF file with a notice that began, "I am awaiting a copy of what I understand is a cease-and-desist (or takedown) notice that was sent to my Web host earlier this evening.

"Upon review of the notice, I will respond accordingly and immediately, but have no intention of rolling over," Forno went on.

He had moved the file from its earlier location and placed it here, at least temporarily. (Note: the link may be inactive if Forno removes the file.)

As of about 5 p.m. Pacific Daylight Time, Friday, Lynn's briefing, "The Holy Grail: Cisco IOS Shellcode And Exploitation Techniques," was also available on Cryptome.org. There was no indication on that site that it would soon remove the file, which is a hard copy of the 35 slides Lynn used during his Wednesday briefing.

Earlier Friday, a Cisco spokesman, John Noh, has said "We're aware of the PDF and we're having discussions with our counsels now. All I can say at the moment is that we're going to take every reasonable measure to protect the interests of our customers and our company."

It seems one of those measures will be to demand that sites now hosting the PDF file remove it.

Lynn's briefing led to an injunction against him and the Black Hat conference sought by Cisco and ISS. Thursday, a settlement was reached that required Black Hat to destroy video of the talk and Lynn to hand over all reference materials. Lynn was also forbidden to discuss any information about the exploit technique in the future.

The muzzling of the conference and Lynn couldn't put the genie back in the bottle, however, as the slides showed up in a message on the Full Disclosure security mailing list, and then on several sites.

The original message to Full Disclosure was posted by someone identifying himself as Larry Blumenthal, who wrote "Information wants to be free. Time to free it!" as he included a .zip archive of the PDF file. The file has since been purged from the list.

Lynn's presentation begins provocatively -- it's easy to see why Cisco would object -- with an image of a sinking Titanic under the phrase "Another Unbreakable System." Other slides with such topics as "Misconceptions" include bullet items such as "It is not possible to overflow buffers on IOS." Even his nine-step wrap of the demonstrated exploitation technique has an edge, with step 9 reading "World Domination."

Reportedly the slides slightly differ from the ones Lynn used at Black Hat. Specifically, they still bear the ISS logo -- which Lynn had removed prior to the briefing since he had resigned from the Atlanta-based company in order to give the talk -- and the stack lacked the link to Lynn's resume, which was on one of the last slides in the real deal.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
Top-Paying U.S. Cities for Data Scientists and Data Analysts
Cynthia Harvey, Freelance Journalist, InformationWeek,  11/5/2019
Slideshows
10 Strategic Technology Trends for 2020
Jessica Davis, Senior Editor, Enterprise Apps,  11/1/2019
Commentary
Is the Computer Science Degree Dead?
Guest Commentary, Guest Commentary,  11/6/2019
White Papers
Register for InformationWeek Newsletters
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
Slideshows
Flash Poll