nanog mailing list archives

Re: Cisco IOS Exploit Cover Up


From: Petri Helenius <pete () he iki fi>
Date: Sat, 30 Jul 2005 13:38:20 +0300


Stephen Fulton wrote:


That assumes that the worm must "discover" exploitable hosts. What if those hosts have already been identified through other means previously? A nation, terrorist or criminal with the means could very well compile a relatively accurate database and use such a worm to attack specific targets, and those attacks need not be destructive/disruptive.

Sure, most of the people on this list would make very smart and skilled criminals if they would choose to pursue that path.

Pete


Current thread: