[82855] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco IOS Exploit Cover Up

daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Sat Jul 30 03:33:00 2005

Date: Sat, 30 Jul 2005 13:02:11 +0530
From: Suresh Ramasubramanian <ops.lists@gmail.com>
Reply-To: Suresh Ramasubramanian <ops.lists@gmail.com>
To: Janet Sullivan <ciscogeek@bgp4.net>
Cc: swm@emanon.com, nanog@merit.edu
In-Reply-To: <42EA871C.60200@bgp4.net>
Errors-To: owner-nanog@merit.edu


On 30/07/05, Janet Sullivan <ciscogeek@bgp4.net> wrote:
>=20
> If a worm writer wanted to cause chaos, they wouldn't target 2500s, but
> 7200s, 7600s, GSRs, etc.
>=20

That's like saying "nobody will write windows trojans to infect tiny
PCs, they'll go after big fat *nix servers with rootkits"

Something as simple as a default enable password :)  I wonder how many
routers out there have open telnet access and enable set to "cisco" or
"password123" :)

--=20
Suresh Ramasubramanian (ops.lists@gmail.com)

home help back first fref pref prev next nref lref last post