North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Cisco vulnerability and dangerous filtering techniques

  • From: Steve
  • Date: Tue Jul 22 17:07:51 2003

Just a handful of traceroutes would give it enough information to start
at a major backbone and work back towards itself.

-SW

> It could poll different looking glasses...  
> 
> > -----Original Message-----
> > From: [email protected] [mailto:[email protected]]
> > Sent: Tuesday, July 22, 2003 4:01 PM
> > To: Austad, Jay
> > Cc: [email protected]
> > Subject: RE: Cisco vulnerability and dangerous filtering techniques
> > 
> > 
> > > I was thinking about this the other day.  The most 
> > efficient way to make
> > > this work would be to spread using some vulnerability (like 
> > the Microsoft
> > > DCOM vulnerability released last week), and then at a 
> > predetermined time,
> > > start DoS'ing routers in the IP space of major providers, 
> > and then work your
> > > way towards the "edges."  
> > 
> > Pray tell, the virus will also get BGP feeds to determine 
> > where the edges
> > are?
> > 
> > Alex
> > 
> > 
>