Articles Blog | G5 Cyber Security

Research – ciscoLEAP.txt

Writing describing the short comings of Cisco’s LEAP authentication used on their wireless access points and how to score root on them.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/31761/ciscoLEAP.txt

Source: https://packetstormsecurity.com/files/31761/ciscoLEAP.txt.html

Exit mobile version