North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Cisco IOS Exploit Cover Up

  • From: Suresh Ramasubramanian
  • Date: Sat Jul 30 03:35:06 2005
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=Rxi1pHTqUVSkD47J7usKw3SSfuPH76w0RT20gQ1DsfJ5Yr97eeWFwZcaTJVMkgxHF+MijD+T5+HpTgazKRRr9Arw6LmpZS6ANTJoiO5I2FDey116seGzBiWhbg0ZyS5wDMYaohZzCLSt4lDpAkz4LcjyFve4SE2pv9GmWBObS4A=

On 30/07/05, Janet Sullivan <[email protected]> wrote:
> 
> If a worm writer wanted to cause chaos, they wouldn't target 2500s, but
> 7200s, 7600s, GSRs, etc.
> 

That's like saying "nobody will write windows trojans to infect tiny
PCs, they'll go after big fat *nix servers with rootkits"

Something as simple as a default enable password :)  I wonder how many
routers out there have open telnet access and enable set to "cisco" or
"password123" :)

-- 
Suresh Ramasubramanian ([email protected])