[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
NSA able to compromise Cisco, Juniper, Huawei switches
- Subject: NSA able to compromise Cisco, Juniper, Huawei switches
- From: wbailey at satelliteintelligencegroup.com (Warren Bailey)
- Date: Mon, 30 Dec 2013 16:38:37 +0000
- In-reply-to: <[email protected]>
- References: <CADb1SusoPKF0n0rhazJ0GKMLLQMh=-EL83ruzu6cyuoVp4L2jA@mail.gmail.com> <[email protected]>, <[email protected]>
I built the other.
Sent from my Mobile Device.
-------- Original message --------
From: Jeremy Bresley <brez at brezworks.com>
Date: 12/30/2013 7:34 AM (GMT-09:00)
To: nanog at nanog.org
Subject: Re: NSA able to compromise Cisco, Juniper, Huawei switches
On 12/30/2013 9:05 AM, Warren Bailey wrote:
> I'd love to know how they were getting in flight wifi.
>
>
> Sent from my Mobile Device.
>
>
> -------- Original message --------
> From: sten rulz <stenrulz at gmail.com>
> Date: 12/30/2013 12:32 AM (GMT-09:00)
> To: nanog at nanog.org
> Subject: NSA able to compromise Cisco, Juniper, Huawei switches
>
>
> Found some interesting news on one of the Australia news websites.
>
> http://www.scmagazine.com.au/News/368527,nsa-able-to-compromise-cisco-juniper-huawei-switches.aspx
>
> Regards,
> Steven.
Simple. Grab it from where it hits the base stations. One of the two
big in-flight Wifi carriers in the US uses Sprint towers, I believe the
other used satellite.
They have to get back to a ground station somewhere in order to get
network access. Easy to tap it there and send it wherever you want.
Grabbing an ad-hoc signal between two endpoints in the air is probably
significantly more involved. Implementation of this is left as an
exercise for the VERY well-funded reader. ;-)
Jeremy "TheBrez" Bresley
brez at brezworks.com