Just a handful of traceroutes would give it enough information to start at a major backbone and work back towards itself.
-SW > It could poll different looking glasses... > > > -----Original Message----- > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] > > Sent: Tuesday, July 22, 2003 4:01 PM > > To: Austad, Jay > > Cc: [EMAIL PROTECTED] > > Subject: RE: Cisco vulnerability and dangerous filtering techniques > > > > > > > I was thinking about this the other day. The most > > efficient way to make > > > this work would be to spread using some vulnerability (like > > the Microsoft > > > DCOM vulnerability released last week), and then at a > > predetermined time, > > > start DoS'ing routers in the IP space of major providers, > > and then work your > > > way towards the "edges." > > > > Pray tell, the virus will also get BGP feeds to determine > > where the edges > > are? > > > > Alex > > > > >
