nanog mailing list archives
Re: Cisco IOS Exploit Cover Up
From: Petri Helenius <pete () he iki fi>
Date: Sat, 30 Jul 2005 13:38:20 +0300
Stephen Fulton wrote:
Sure, most of the people on this list would make very smart and skilled criminals if they would choose to pursue that path.That assumes that the worm must "discover" exploitable hosts. What if those hosts have already been identified through other means previously? A nation, terrorist or criminal with the means could very well compile a relatively accurate database and use such a worm to attack specific targets, and those attacks need not be destructive/disruptive.
Pete
Current thread:
- Re: Cisco IOS Exploit Cover Up, (continued)
- Re: Cisco IOS Exploit Cover Up Chris Adams (Jul 29)
- Re: Cisco IOS Exploit Cover Up Valdis . Kletnieks (Jul 29)
- Re: Cisco IOS Exploit Cover Up Suresh Ramasubramanian (Jul 30)
- RE: Cisco IOS Exploit Cover Up Buhrmaster, Gary (Jul 28)
- RE: Cisco IOS Exploit Cover Up Buhrmaster, Gary (Jul 28)
- Re: Cisco IOS Exploit Cover Up Hyunseog Ryu (Jul 28)
- RE: Cisco IOS Exploit Cover Up Buhrmaster, Gary (Jul 29)
- Re: Cisco IOS Exploit Cover Up Petri Helenius (Jul 29)
- Re: Cisco IOS Exploit Cover Up Stephen Fulton (Jul 29)
- Re: Cisco IOS Exploit Cover Up Christopher L. Morrow (Jul 30)
- Re: Cisco IOS Exploit Cover Up Petri Helenius (Jul 30)
- Re: Cisco IOS Exploit Cover Up Petri Helenius (Jul 29)