[82859] in North American Network Operators' Group
Re: Cisco IOS Exploit Cover Up
daemon@ATHENA.MIT.EDU (Petri Helenius)
Sat Jul 30 06:39:25 2005
Date: Sat, 30 Jul 2005 13:38:20 +0300
From: Petri Helenius <pete@he.iki.fi>
To: Stephen Fulton <nanog@esoteric.ca>
Cc: nanog@merit.edu
In-Reply-To: <42EAC292.2080003@esoteric.ca>
Errors-To: owner-nanog@merit.edu
Stephen Fulton wrote:
>
> That assumes that the worm must "discover" exploitable hosts. What if
> those hosts have already been identified through other means
> previously? A nation, terrorist or criminal with the means could
> very well compile a relatively accurate database and use such a worm
> to attack specific targets, and those attacks need not be
> destructive/disruptive.
>
Sure, most of the people on this list would make very smart and skilled
criminals if they would choose to pursue that path.
Pete