North American Network Operators Group
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Historical
Re: Cisco IOS Exploit Cover Up
- From: Petri Helenius
- Date: Sat Jul 30 06:40:01 2005
Stephen Fulton wrote:
That assumes that the worm must "discover" exploitable hosts. What if
those hosts have already been identified through other means
previously? A nation, terrorist or criminal with the means could
very well compile a relatively accurate database and use such a worm
to attack specific targets, and those attacks need not be
destructive/disruptive.
Sure, most of the people on this list would make very smart and skilled
criminals if they would choose to pursue that path.
Pete
|