Originally Posted by epic1337
by means of snooping, the fact that they managed to get what they want in this case means they have the ability to do it.
you can read their modus from this:
An interesting read, but some of those techniques would require access to locked data closets although I guess you could possibly splice into a backbone. Sniffers wouldn't get you passwords and usernames anymore because they haven't been sent as plain text in years. Telnet, FTP and rlogin are similarly dead issues, none of the *ix boxes I have at work allow the use of rlogin, FTP or telnet sessions anymore.
Top end Cisco switches are quite sophisticated and will pick up packet flooding quickly as well as port scanning and alert network admins via automated email.
To use these techniques to hack our corporate network remotely would require compromising a PC that has VPN access through a secureID synced to our system and a login ID or a system already inside the corporate network. IP addresses that are exposed to the public are all on a private network separated from the corporate network -- ditto for public WiFi.
The rlogin/rsh/rcp attack is an interesting avenue of attack, but it would have to be launched from a compromised system from within the corporate network or connecting remotely via VPN, it would also require not only some knowledge of the IP addresses of the systems on the network but a user id that's valid for the targeted system.