TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The Fake Cisco – Hunting for Backdoors in Counterfeit Cisco Devices [pdf]

62 pointsby PatrolXalmost 5 years ago

3 comments

EvanAndersonalmost 5 years ago
Yesterday&#x27;s discussion: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=23843485" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=23843485</a>
beams_of_lightalmost 5 years ago
Very interesting. Some of it was over my head, but it didn&#x27;t appear that the goal was surveillance or circumvention of security measures (aside from circumventing some boot verification of files). I assume the counterfeiters&#x27; goal is simply to make money. Anyone on the F-Secure team here by chance, and have a comment on that conclusion?
评论 #23863668 未加载
sneakalmost 5 years ago
tl;dr: no backdoors, but they did have to break the hardware platform authentication security to run on the counterfeit hardware, which opens a persistence vector that isn’t there on authentic gear.<p>Great work!