SLIDE 8 Cisco IOS architecture Architecture Analyzing Pros and Cons Use case: IOS malware Use case: ROMMON debugging Use cases: Fuzzer Wrapping up Pros vs Cons Why isolation is good? I don’t need this, I have the verify command Shortcomings of self-checking routines
Why isolation is good?
Analyzing malware
Malware Cisco IOS
Mirror Built−In GDB Stub Read_Memory Request
Bytes Expected (fake) GDB Client
Original memory
Figure: Using built-in GDB
Analyzing malware
GDB Stub Malware Cisco IOS Read_Memory Malware memory GDB Client DYNAMIPS dump
Figure: Dynamips GDB server
Lesson learned: NEVER analyze malware inside an infected host.
Groundworks Technologies Fuzzing and Debugging Cisco IOS