{"id":518,"date":"2011-03-23T14:28:55","date_gmt":"2011-03-23T19:28:55","guid":{"rendered":"http:\/\/www.willhackforsushi.com\/?p=518"},"modified":"2011-03-23T14:28:55","modified_gmt":"2011-03-23T19:28:55","slug":"pen-test-perfect-storm-6-we-love-cisco","status":"publish","type":"post","link":"https:\/\/www.willhackforsushi.com\/?p=518","title":{"rendered":"Pen Test Perfect Storm 6: We Love Cisco!"},"content":{"rendered":"<p>Today, <a href=\"http:\/\/twitter.com\/secureideas\">Kevin Johnson<\/a>, <a href=\"http:\/\/twitter.com\/edskoudis\">Ed Skoudis<\/a> and <a href=\"http:\/\/twitter.com\/joswr1ght\">I<\/a> delivered the 6th part of the Pen Test Perfect Storm Trilogy: We Love Cisco!.<\/p>\n<p>In the webcast, hosted by <a href=\"http:\/\/www.coresecurity.com\/\">CORE Security Technologies<\/a>, we discussed attack techniques against Cisco devices, combining wireless, network and web app techniques to exploit common network architectures. Topics include:<\/p>\n<ul>\n<li>Enumerating SNMP Community strings<\/li>\n<li>Retrieving Cisco router or switch configurations over SNMP<\/li>\n<li>History of vulnerabilities in the Cisco Wireless LAN Controller<\/li>\n<li>Exploiting Cisco Web App interfaces with Burp Proxy and Burp Intruder<\/li>\n<li>Exploiting Cisco Voice VLAN&#8217;s with voiphopper<\/li>\n<li>A practical scenario, combining network, wireless and web app attack techniques<\/li>\n<\/ul>\n<p>CORE is busy putting together the recording that you can download and watch at your leisure, but in the meantime you can grab the slides in the <a href=\"http:\/\/www.willhackforsushi.com\/?page_id=137\">Presentations section<\/a>, or <a href=\"http:\/\/www.willhackforsushi.com\/presentations\/PenTest_PerfectStorm_Part_6.pdf\">directly here<\/a>.  All past presentations in PDF form are also available in the presentations section, or at the CORE Security Technologies <a href=\"http:\/\/www.coresecurity.com\/content\/penetration-testing-webcasts\">webcast archive page<\/a>.<\/p>\n<p>Thanks to all who attended the webcast today!<\/p>\n<p>-Josh<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, Kevin Johnson, Ed Skoudis and I delivered the 6th part of the Pen Test Perfect Storm Trilogy: We Love Cisco!. In the webcast, hosted by CORE Security Technologies, we discussed attack techniques against Cisco devices, combining wireless, network and &hellip; <a href=\"https:\/\/www.willhackforsushi.com\/?p=518\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,13],"tags":[],"class_list":["post-518","post","type-post","status-publish","format-standard","hentry","category-cisco","category-penetration-testing"],"_links":{"self":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/posts\/518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=518"}],"version-history":[{"count":3,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/posts\/518\/revisions"}],"predecessor-version":[{"id":521,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/posts\/518\/revisions\/521"}],"wp:attachment":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}