Cisco vulnerability and dangerous filtering techniques

Steve sweaver at aquaria.org
Tue Jul 22 21:04:31 UTC 2003


Just a handful of traceroutes would give it enough information to start
at a major backbone and work back towards itself.

-SW

> It could poll different looking glasses...  
> 
> > -----Original Message-----
> > From: alex at yuriev.com [mailto:alex at yuriev.com]
> > Sent: Tuesday, July 22, 2003 4:01 PM
> > To: Austad, Jay
> > Cc: nanog at merit.edu
> > Subject: RE: Cisco vulnerability and dangerous filtering techniques
> > 
> > 
> > > I was thinking about this the other day.  The most 
> > efficient way to make
> > > this work would be to spread using some vulnerability (like 
> > the Microsoft
> > > DCOM vulnerability released last week), and then at a 
> > predetermined time,
> > > start DoS'ing routers in the IP space of major providers, 
> > and then work your
> > > way towards the "edges."  
> > 
> > Pray tell, the virus will also get BGP feeds to determine 
> > where the edges
> > are?
> > 
> > Alex
> > 
> > 
> 




More information about the NANOG mailing list