North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Cisco IOS Exploit Cover Up

  • From: Stephen Fulton
  • Date: Fri Jul 29 19:59:15 2005

Petri Helenius wrote:

Fortunately destructive worms don't usually get too wide distribution because they don't survive long.
That assumes that the worm must "discover" exploitable hosts. What if those hosts have already been identified through other means previously? A nation, terrorist or criminal with the means could very well compile a relatively accurate database and use such a worm to attack specific targets, and those attacks need not be destructive/disruptive.

-- Stephen.