Cisco IOS Exploit Cover Up

Stephen Fulton nanog at esoteric.ca
Fri Jul 29 23:58:10 UTC 2005


Petri Helenius wrote:

> Fortunately destructive worms don't usually get too wide distribution 
> because they don't survive long.

That assumes that the worm must "discover" exploitable hosts.  What if 
those hosts have already been identified through other means previously? 
    A nation, terrorist or criminal with the means could very well 
compile a relatively accurate database and use such a worm to attack 
specific targets, and those attacks need not be destructive/disruptive.

-- Stephen.



More information about the NANOG mailing list