[59832] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Cisco vulnerability and dangerous filtering techniques

daemon@ATHENA.MIT.EDU (alex@yuriev.com)
Tue Jul 22 16:44:07 2003

Date: Tue, 22 Jul 2003 17:00:44 -0400 (EDT)
From: alex@yuriev.com
To: "Austad, Jay" <JAustad@temgweb.com>
Cc: nanog@merit.edu
In-Reply-To: <288FAF5565A1A74EA5E35C39E7EE1D42077FE203@mail.temgweb.com>
Errors-To: owner-nanog-outgoing@merit.edu


> I was thinking about this the other day.  The most efficient way to make
> this work would be to spread using some vulnerability (like the Microsoft
> DCOM vulnerability released last week), and then at a predetermined time,
> start DoS'ing routers in the IP space of major providers, and then work your
> way towards the "edges."  

Pray tell, the virus will also get BGP feeds to determine where the edges
are?

Alex


home help back first fref pref prev next nref lref last post