This document describes how to remotely exploit and attack seismological networks. It outlines motivations, provides an introduction to seismology networks, and demonstrates attacks including gaining unauthorized access via vulnerabilities like backdoors and Shellshock. The presentation recommends vendors improve security of these devices which are connected to the internet without proper protections. It shows how an attacker could gain control of devices, sensor data, and potentially disrupt earthquake monitoring for malicious purposes.