Cisco IOS Exploit Cover Up
Petri Helenius
pete at he.iki.fi
Sat Jul 30 10:38:20 UTC 2005
Stephen Fulton wrote:
>
> That assumes that the worm must "discover" exploitable hosts. What if
> those hosts have already been identified through other means
> previously? A nation, terrorist or criminal with the means could
> very well compile a relatively accurate database and use such a worm
> to attack specific targets, and those attacks need not be
> destructive/disruptive.
>
Sure, most of the people on this list would make very smart and skilled
criminals if they would choose to pursue that path.
Pete
More information about the NANOG
mailing list