TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The Shadow Brokers EPICBANANAS and EXTRABACON Exploits

83 pointsby hwatsonalmost 9 years ago

4 comments

dogma1138almost 9 years ago
On thing I find odd is<p><i>&quot;JETPLOW is a persistent implant of EPICBANANA. Digitally signed Cisco software is signed using secure asymmetrical (public-key) cryptography in newer platforms prevents these types of attacks. The purpose of digitally signed Cisco software is to increase the security posture of Cisco ASA devices by ensuring that the software running on the system has not been tampered with and originated from a trusted source as claimed.&quot;</i><p>They claim that the implant is digitally signed, then they say that it shouldn&#x27;t work because Cisco software is digitally signed also, and it&#x27;s verified by the Cisco Secure Boot.<p>Isn&#x27;t that a bit contradictory? sure they might have had flaws in their verification process (we&#x27;ve seen signature verifications that were nothing more than &quot;is this a signed message&quot; before) but since Cisco verifies the signature properly (as you haven&#x27;t been able to binary patch Cisco boot images for 5+ years) doesn&#x27;t this implies that the NSA got a hold of the signing keys used by Cisco or an authorized 3rd party?
评论 #12321775 未加载
评论 #12323015 未加载
评论 #12321772 未加载
评论 #12321811 未加载
评论 #12322097 未加载
评论 #12323172 未加载
评论 #12323286 未加载
walrus01almost 9 years ago
re: EXTRABACON<p>If you have SNMP listening on a public ipv4&#x2F;ipv6 interface of a firewall (I don&#x27;t care if it&#x27;s an EOL&#x2F;EOS PIX or not), you have done something fundamentally wrong from the start. As a network engineer seeing something like this in a business customer&#x27;s equipment would cause me to seriously reconsider all other decisions&#x2F;security configurations made by a predecessor or third party contractor.
评论 #12322705 未加载
评论 #12322743 未加载
评论 #12324357 未加载
评论 #12322922 未加载
评论 #12324333 未加载
LeafStormalmost 9 years ago
Is this a standard naming convention for exploits?
评论 #12324743 未加载
评论 #12324017 未加载
xrochealmost 9 years ago
It it yet another ASN.1-related exploit ?