[82859] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco IOS Exploit Cover Up

daemon@ATHENA.MIT.EDU (Petri Helenius)
Sat Jul 30 06:39:25 2005

Date: Sat, 30 Jul 2005 13:38:20 +0300
From: Petri Helenius <pete@he.iki.fi>
To: Stephen Fulton <nanog@esoteric.ca>
Cc: nanog@merit.edu
In-Reply-To: <42EAC292.2080003@esoteric.ca>
Errors-To: owner-nanog@merit.edu


Stephen Fulton wrote:

>
> That assumes that the worm must "discover" exploitable hosts.  What if 
> those hosts have already been identified through other means 
> previously?    A nation, terrorist or criminal with the means could 
> very well compile a relatively accurate database and use such a worm 
> to attack specific targets, and those attacks need not be 
> destructive/disruptive.
>
Sure, most of the people on this list would make very smart and skilled 
criminals if they would choose to pursue that path.

Pete


home help back first fref pref prev next nref lref last post