[28380] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: ABOVE.NET SECURITY TRUTHS?

daemon@ATHENA.MIT.EDU (Exiled Dave)
Fri Apr 28 16:12:48 2000

Message-ID: <20000428201008.13218.qmail@web3105.mail.yahoo.com>
Date: Fri, 28 Apr 2000 13:10:08 -0700 (PDT)
From: Exiled Dave <exiled_dave@yahoo.com>
To: nanog@merit.edu
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Errors-To: owner-nanog-outgoing@merit.edu



Ive had some private messages asking if i was involved
in this. I wasnt. I was asked to write this initial
email by someone who KNOWS the real truth of what
happened at above, and why they are being so
tight-lipped.

Lets think about this, cisco in no way has such a flaw
that would allow someone to 'root' and erase all the
info on switches. The password was sniffed.

Unless above has some employee who felt the need to do
do this. But, my Above rep laughling CONFIRMED that
this was the problem. COMMON PASSWORDS. 

Cant we make it a LITTLE tougher on the script
kiddies?
And not make EVERY MAJOR switch the same password?

This is safe to post, because my above sales rep told
me what the old password was. God. THATS SECURITY.
Sales reps telling Clients OLD PASSWORDS.
So, if we wanna verify my authenticity, Here's what
she told me:
whY2Ghay/1Pee-Fr331y

Sound framiliar Above? Im suprised by lack of comment
from you. 

Im out to HELP. Not to hurt.




__________________________________________________
Do You Yahoo!?
Talk to your friends online and get email alerts with Yahoo! Messenger.
http://im.yahoo.com/


home help back first fref pref prev next nref lref last post