Re: Cisco VPN Concentrator GUI

From: Atte Peltomaki (atte.peltomaki@f-secure.com)
Date: Tue May 17 2005 - 02:31:06 EDT


> i am pen-testing one of our clients and am seeing
> their web interface to the vpn concentrator (cisco)
> available publicly on the internet with the username
> /password page.
> How could i explain somebody tht it can be
> exploited...am sure this is not a good idea to hav ur
> vpn concnetrator interface on the public internet..but
> i cant find any vulenrabilites on the net ....to
> explain to the person....only thing i can think of is
> brute forcing the username pasword field...which is
> again a challenge for web vpn..any ideas??
> thanks

Well, if the page is entirely public, it shouldn't be too difficult to
create a similar page for phishing, then do some dns/arp/whatever
poisoning, and hope the admin is dumb enough not to be bothered about
SSL warning over changed cert (if SSL is being used).

-- 
 ____________
 \   ______//     Atte Peltomäki - Atte.Peltomaki@F-Secure.com
  \  \\____           	 IT Engineer - IT Server Team
   \   __//    F-Secure Corp. PL 24, FIN-00181 Helsinki, Finland
    \  \\     Tel: +358 9 2520 0700,     direct: +358 9 2520 5423   
     \ //                   http://www.F-Secure.com
      \/         Integrated Solutions for Enterprise Security


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:21 EDT