logoalt Hacker News

ErroneousBoshtoday at 10:16 AM1 replyview on HN

Okay, so not only do you have to create a bogus packet, you have to convince every piece of equipment in between you and the end user to collude with it, in the hopes that the final router is so woefully misconfigured as to act upon it?


Replies

bandramitoday at 10:33 AM

The ISP is the primary threat vector here (do you trust yours? Along with their contractors and anyone who might have compromised them?). But like I said route-poisoning attacks do exist.

show 2 replies