TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

The Fake Cisco – Hunting for Backdoors in Counterfeit Cisco Devices [pdf]

62 点作者 PatrolX将近 5 年前

3 条评论

EvanAnderson将近 5 年前
Yesterday&#x27;s discussion: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=23843485" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=23843485</a>
beams_of_light将近 5 年前
Very interesting. Some of it was over my head, but it didn&#x27;t appear that the goal was surveillance or circumvention of security measures (aside from circumventing some boot verification of files). I assume the counterfeiters&#x27; goal is simply to make money. Anyone on the F-Secure team here by chance, and have a comment on that conclusion?
评论 #23863668 未加载
sneak将近 5 年前
tl;dr: no backdoors, but they did have to break the hardware platform authentication security to run on the counterfeit hardware, which opens a persistence vector that isn’t there on authentic gear.<p>Great work!