exploiting TACACS+

From: Valter Santos (vsantola@sectoid.com)
Date: Tue Jul 26 2005 - 04:54:25 EDT


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi folks,

i'm conduting a pentest where i found a cisco router with telnet open to
the world. The route is using TACACS+ for autentication. Can some one
give me some lights on how to exploit this without using bruteforce ? :-)

thanx in advance
/valter

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFC5fpBR7pJvOKksgYRAkZmAKDeeu8TTjDFJWGyGcAfxV2y4WUVjgCggNbP
g2dBwn7zDjb8ewHGEx71+TM=
=yrZN
-----END PGP SIGNATURE-----



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:38 EDT