Featured Articles

Snapdragon 400 is Qualcomm’s SoC for watches, wearables

Snapdragon 400 is Qualcomm’s SoC for watches, wearables

We wanted to learn a bit more about Qualcomm's plans for wearables and it turns out that the company believes its…

More...
Qualcomm sampling 20nm Snapdragon 810

Qualcomm sampling 20nm Snapdragon 810

We had a chance to talk to Michelle Leyden-Li, Senior Director of Marketing, QCT at Qualcomm and get an update on…

More...
EVGA GTX 970 SC ACX 2.0 reviewed

EVGA GTX 970 SC ACX 2.0 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Nvidia GTX 980 reviewed

Nvidia GTX 980 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
PowerColor TurboDuo R9 285 reviewed

PowerColor TurboDuo R9 285 reviewed

Today we will take a look at the PowerColor TurboDuo Radeon R9 285. The card is based on AMD’s new…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Wednesday, 11 April 2007 11:56

Cisco's NAC ripped apart

Written by

Image

Germans cracked it open


Cisco’s Network Admission Control (NAC) has two flaws which allow unauthorised PCs to be viewed as legitimate devices on a network.

Two German security experts  Michael Thumann, chief security officer, and Dror-John Roecher, senior security consultant at German penetration-testing firm, ERNW have showed a tool which takes advantage of the flaws.

Speaking to Techworld, Roecher said that a "fundamental design" failure makes it possible to trick the policy server to allow any device to access a network.A second flaw prevents the policy server from confirming whether the information it gets from the trust agent is accurate. Therefore, he said, spoofed information can easily be sent to the policy server. He demonstrated a way of persuading the installed Trust Agent to not report what's actually on the system but to report what we want it to.

All it takes is to spoof the credentials and gain access to the network" with a system that is completely out of compliance.

More here.

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments