Cisco IOS Exploit Cover Up

Petri Helenius pete at he.iki.fi
Sat Jul 30 10:38:20 UTC 2005


Stephen Fulton wrote:

>
> That assumes that the worm must "discover" exploitable hosts.  What if 
> those hosts have already been identified through other means 
> previously?    A nation, terrorist or criminal with the means could 
> very well compile a relatively accurate database and use such a worm 
> to attack specific targets, and those attacks need not be 
> destructive/disruptive.
>
Sure, most of the people on this list would make very smart and skilled 
criminals if they would choose to pursue that path.

Pete




More information about the NANOG mailing list