Re: Attacking TACACS

From: lists@packetfocus.com
Date: Wed Jul 26 2006 - 03:43:05 EDT


('binary' encoding is not supported, stored as-is) Hey Mike,

DoS it :)

  Cisco devices should have a secondary login stored locally if they can't reach the TACACS server. You can test this my flooding the port. UDPFlood so on. This could also test for security setting on the Cisco Gear.

 - TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to Unix networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system. TACACS is an encryption protocol and therefore less secure than the later TACACS+ and Remote Authentication Dial-In User Service protocols. A later version of TACACS is XTACACS (Extended TACACS). Both are described in Request for Comments 1492.

Josh Perrymon
CEO
Packetfocus.com

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:24 EDT