Writing describing the short comings of Cisco’s LEAP authentication used on their wireless access points and how to score root on them.
You can download it from the following link: https://packetstormsecurity.com/files/download/31761/ciscoLEAP.txt
Source: https://packetstormsecurity.com/files/31761/ciscoLEAP.txt.html

