Solved

Hacking a PIX

Posted on 2006-11-13
5
665 Views
Last Modified: 2013-11-16
I was wondering if it had ever been done...i thought our network was pretty secure with a pix sitting at the entrance, but somebody told me there would still be ways to hack in. How?
0
Comment
Question by:jaysonfranklin
  • 3
  • 2
5 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 250 total points
ID: 17932380
Only by you not having appropriate security set on the device or by giving the password details to somebody that you shouldn't. By this I mean a loose tongue, not having suitable passwords to gain access to the pix and a different enable password etc. To my knowledge (happy to be corrected if someone knows more) a PIX has never been 'hacked' from the cold...
0
 
LVL 1

Author Comment

by:jaysonfranklin
ID: 17932911
That's what I thought.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17934970
Anything else I can tell you?
0
 
LVL 1

Author Comment

by:jaysonfranklin
ID: 17935280
sorry bout that...
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17936221
thanks :)
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Join & Write a Comment

This article assumes you have at least one Cisco ASA or PIX configured with working internet and a non-dynamic, public, address on the outside interface. If you need instructions on how to enable your device for internet, or basic configuration info…
From Cisco ASA version 8.3, the Network Address Translation (NAT) configuration has been completely redesigned and it may be helpful to have the syntax configuration for both at a glance. You may as well want to read official Cisco published AS…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now