North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Cisco IOS Exploit Cover Up

  • From: Petri Helenius
  • Date: Sat Jul 30 06:40:01 2005

Stephen Fulton wrote:

That assumes that the worm must "discover" exploitable hosts. What if those hosts have already been identified through other means previously? A nation, terrorist or criminal with the means could very well compile a relatively accurate database and use such a worm to attack specific targets, and those attacks need not be destructive/disruptive.

Sure, most of the people on this list would make very smart and skilled criminals if they would choose to pursue that path.