Andreas, although I think it is specific to VPN concentrators, this is what I think you are refering to:
http://www.nta-monitor.com/posts/2005/06/cisco-concentrator-groupname-enumeration-vulnerability.html and http://www.nta-monitor.com/posts/2005/01/VPN-Flaws-Whitepaper.pdf you need ike-scan, available from the aforementioned website as well ZQ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
