Vulnerability Development mailing list archives
Re: Router worm exploiting poor SNMP security.
From: Ralph Moonen <orb () TINK DEMON NL>
Date: Fri, 15 Dec 2000 21:29:25 +0100
At 12:49 14-12-00 -0800, J Edgar Hoover wrote:
Remote configuration seems to be more promising. You can add interfaces, specify a remote TFTP server from which to load configs or *new firmware*, and more.
Don't forget that IOS11.2's source is floating around in hackerland. It would be completely possible to create a new/trojaned/alternative IOS load for cisco's and upload it. Given enough time, it should be possible to 0wn a substantial part of the Internet :-) --Ralph
Current thread:
- Re: Router worm exploiting poor SNMP security., (continued)
- Re: Router worm exploiting poor SNMP security. Dragos Ruiu (Dec 15)
- Re: Router worm exploiting poor SNMP security. nsc (Dec 15)
- Re: Router worm exploiting poor SNMP security. Lincoln Yeoh (Dec 15)
- Re: Router worm exploiting poor SNMP security. Ralph Moonen (Dec 15)
- Re: Router worm exploiting poor SNMP security. M ixter (Dec 15)
- Re: Router worm exploiting poor SNMP security. Jose Nazario (Dec 15)
- Re: Router worm exploiting poor SNMP security. Lars Nygård (Dec 15)
- Re: Router worm exploiting poor SNMP security. N Catlow (Dec 15)
- Re: Router worm exploiting poor SNMP security. J Edgar Hoover (Dec 15)
- Re: Router worm exploiting poor SNMP security. Charles C. Lindsay (Dec 16)
- Message not available
- Re: Router worm exploiting poor SNMP security. Ralph Moonen (Dec 17)
- Re: Router worm exploiting poor SNMP security. Joe Shaw (Dec 18)
- Message not available
- SNMP community strings Ralph Moonen (Dec 17)
- Re: Router worm exploiting poor SNMP security. Fyodor (Dec 15)