North American Network Operators Group Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical Re: Cisco vulnerability and dangerous filtering techniques
Just a handful of traceroutes would give it enough information to start at a major backbone and work back towards itself. -SW > It could poll different looking glasses... > > > -----Original Message----- > > From: [email protected] [mailto:[email protected]] > > Sent: Tuesday, July 22, 2003 4:01 PM > > To: Austad, Jay > > Cc: [email protected] > > Subject: RE: Cisco vulnerability and dangerous filtering techniques > > > > > > > I was thinking about this the other day. The most > > efficient way to make > > > this work would be to spread using some vulnerability (like > > the Microsoft > > > DCOM vulnerability released last week), and then at a > > predetermined time, > > > start DoS'ing routers in the IP space of major providers, > > and then work your > > > way towards the "edges." > > > > Pray tell, the virus will also get BGP feeds to determine > > where the edges > > are? > > > > Alex > > > > >
|