Cisco vulnerability and dangerous filtering techniques
Steve
sweaver at aquaria.org
Tue Jul 22 21:04:31 UTC 2003
Just a handful of traceroutes would give it enough information to start
at a major backbone and work back towards itself.
-SW
> It could poll different looking glasses...
>
> > -----Original Message-----
> > From: alex at yuriev.com [mailto:alex at yuriev.com]
> > Sent: Tuesday, July 22, 2003 4:01 PM
> > To: Austad, Jay
> > Cc: nanog at merit.edu
> > Subject: RE: Cisco vulnerability and dangerous filtering techniques
> >
> >
> > > I was thinking about this the other day. The most
> > efficient way to make
> > > this work would be to spread using some vulnerability (like
> > the Microsoft
> > > DCOM vulnerability released last week), and then at a
> > predetermined time,
> > > start DoS'ing routers in the IP space of major providers,
> > and then work your
> > > way towards the "edges."
> >
> > Pray tell, the virus will also get BGP feeds to determine
> > where the edges
> > are?
> >
> > Alex
> >
> >
>
More information about the NANOG
mailing list