NSA ANT By TAO

From Technologia Incognita
Revision as of 15:32, 3 September 2014 by DrWhax (talk | contribs) (Created page with "How does the NSA TAO team backdoor Cisco VPN's, firewall's and security appliances. A friendly hacker donated a [http://www.cisco.com/c/en/us/products/security/pix-515e-securi...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

How does the NSA TAO team backdoor Cisco VPN's, firewall's and security appliances. A friendly hacker donated a Cisco pix 515e to play with analyzing how the TAO might backdoor this system. Research focuses on dumping BIOS binary, developing persistent backdoor for the BIOS or other components and provide way on how to detect possible backdoors.

https://www.schneier.com/blog/archives/2014/01/jetplow_nsa_exp.html

More used/deployed hardware is appreciated from ISP's. Hint hint.

Looking for:

  • Cisco PIX (500-series) JETPLOW
  • Cisco ASA (5505, 5510, 5520, 5540, 5550)JETPLOW
  • Juniper SSG 500 and SSG 300 series firewalls FEEDTHROUGH
  • Juniper ns5xt, ns25, ns50, ns200, ISG 1000 SOUFFLETHROUGH
  • Any Juniper running JunOS (modified freebsd) (http://phrack.org/issues/66/5.html) SIERAMONTANA
  • Huawei Eudemon (HALLUXWATER)

Components needed: More soon.

Analysis:

Soon. :-)