Cisco IOS Exploit Cover Up
Stephen Fulton
nanog at esoteric.ca
Fri Jul 29 23:58:10 UTC 2005
Petri Helenius wrote:
> Fortunately destructive worms don't usually get too wide distribution
> because they don't survive long.
That assumes that the worm must "discover" exploitable hosts. What if
those hosts have already been identified through other means previously?
A nation, terrorist or criminal with the means could very well
compile a relatively accurate database and use such a worm to attack
specific targets, and those attacks need not be destructive/disruptive.
-- Stephen.
More information about the NANOG
mailing list