So to get this straight you're suggesting break into the ISP's remote administration system, which is probably protected by a VPN tunnel with 1024 bit encryption, hijacking a credential to edit their routing table and managing to pull that off without anyone seeing the audit trail? All...within say 2 minutes? To PK a char that me of all people was able to kill using the overpowered trip command?
Come now.
You could spoof packets assuming you didn't need to get a response (IE fire and forget) but what harm you could do with that I'm not sure - probably varies client by client, OS by OS.
Edited 1 time(s). Last edit at 01/29/2008 07:49AM by Death_Claw.