nanog mailing list archives
Re: Cisco IOS Exploit Cover Up
From: Stephen Fulton <nanog () esoteric ca>
Date: Fri, 29 Jul 2005 19:58:10 -0400
Petri Helenius wrote:
Fortunately destructive worms don't usually get too wide distribution because they don't survive long.
That assumes that the worm must "discover" exploitable hosts. What if those hosts have already been identified through other means previously? A nation, terrorist or criminal with the means could very well compile a relatively accurate database and use such a worm to attack specific targets, and those attacks need not be destructive/disruptive.
-- Stephen.
Current thread:
- RE: Cisco IOS Exploit Cover Up, (continued)
- RE: Cisco IOS Exploit Cover Up David Barak (Jul 29)
- Re: Cisco IOS Exploit Cover Up Janet Sullivan (Jul 29)
- Re: Cisco IOS Exploit Cover Up Chris Adams (Jul 29)
- Re: Cisco IOS Exploit Cover Up Valdis . Kletnieks (Jul 29)
- Re: Cisco IOS Exploit Cover Up Suresh Ramasubramanian (Jul 30)
- Re: Cisco IOS Exploit Cover Up Hyunseog Ryu (Jul 28)
- Re: Cisco IOS Exploit Cover Up Petri Helenius (Jul 29)
- Re: Cisco IOS Exploit Cover Up Stephen Fulton (Jul 29)
- Re: Cisco IOS Exploit Cover Up Christopher L. Morrow (Jul 30)
- Re: Cisco IOS Exploit Cover Up Petri Helenius (Jul 30)