This has my Sh Run and other files
iosv-2 has offset of 10000
iosv-6 has offset of 5000
iosv-1 only shows the 10000.
D 192.168.33.0 [90/3072] via 192.168.32.2, 00:20:28, GigabitEthernet0/2
192.168.34.0/30 is subnetted, 1 subnets
D 192.168.34.0 [90/3328] via 192.168.32.2, 00:20:16, GigabitEthernet0/2
192.168.35.0/30 is subnetted, 1 subnets
D 192.168.35.0 [90/3328] via 192.168.32.2, 00:20:16, GigabitEthernet0/2
192.168.36.0/30 is subnetted, 1 subnets
[90/13328] via 192.168.32.2, 00:20:16, GigabitEthernet0/2
I have a question about sample scenarios in consulting pen-testing with the typical littering the parking lot and public areas of the campus in the scope of the document. I could only assume some employee's might and could find those drives and instead of using them on the "scoped" target and security review take those drives home and their by put the Consultant pen-tester and the Company with the scope of work on the penetration tests.
Have colleagues come across this scenario and or have been brought into suit with employees of companies that later find out from an Email-blast or internal memorandum about the audit and lesson's learned.
I see it would be the due diligence for the consultant company to keep track / count / make model and serial numbers with custom malware for keylogging and persistence on systems but when and if that gets later discovered to have missing units and then having committed a crime under the computer fraud and abuse act.
I am very curious of this has happened, it bet this has happened and what are legal or SoW recommendations including additional run through with a Consultant's legal liability as well as your clients legal department assessing risk and damages.
Sorry it's been a while since was able to reply. I was able to talk to Don about this for just a brief time. Currently, even though it's requested he doesn't see it making our schedule above the other more highly requested content.
I wanted to let you when I found something out.