Difference between revisions of "NSA ANT By TAO"

From Technologia Incognita
Jump to: navigation, search
m (moved Cisco ANT TAO to NSA ANT By TAO: Investigate all the things!)
Line 21: Line 21:
  
 
Soon. :-)
 
Soon. :-)
 +
 +
'''Handy links:'''
 +
* http://www.cisco.com/public/scc/compass/3810/tasks/task_3810-v_boot_rom_replace.htm
 +
* http://uk.alibaba.com/trading-search?CatId=0&Country=&SearchText=cisco+plcc&IndexArea=product_en

Revision as of 18:35, 9 September 2014

How does the NSA TAO team backdoor Cisco VPN's, firewall's and security appliances. A friendly hacker donated a Cisco pix 515e to play with analyzing how the TAO might backdoor this system. Research focuses on dumping BIOS binary, developing persistent backdoor for the BIOS or other components and provide way on how to detect possible backdoors.

https://www.schneier.com/blog/archives/2014/01/jetplow_nsa_exp.html

More used/deployed hardware is appreciated from ISP's. Hint hint.


Looking for:

  • Cisco PIX (500-series) JETPLOW
  • Cisco ASA (5505, 5510, 5520, 5540, 5550)JETPLOW
  • Juniper SSG 500 and SSG 300 series firewalls FEEDTHROUGH
  • Juniper ns5xt, ns25, ns50, ns200, ISG 1000 SOUFFLETHROUGH
  • Any Juniper running JunOS (modified freebsd) (http://phrack.org/issues/66/5.html) SIERAMONTANA
  • Huawei Eudemon (HALLUXWATER)

Components needed: More soon.

Analysis:

Soon. :-)

Handy links: