Vulnerability Development mailing list archives
Re: Badware update through P2P?
From: "Adam [wp-ckkl]" <ckkl () poczta wp pl>
Date: Wed, 17 Jul 2002 20:38:59 +0200
What would happen if such a nasty piece of code used some P2P protocol to update itself? e.g. Gnutella or eDonkey? Has anybody seen such a "feature"?
P2P worms are the most easiest to write since all you need is to drop a file with a random name taken f.ex. from Google Zeitgeist (http://www.google.com.pl/intl/pl/press/zeitgeist.html) into a P2P program's directory. The rest is just an example of pure social engineering. So, why to bother updating at all in P2P? Let users work for you. Adam Blaszczyk [02-05-23] [en/pl] Home page/Domowa http://www.mykakee.com [02-06-06] [pl] Pirotechnika http://pyro.pieklo.org [02-04-27] [pl] Sztolnia, FAQ p.c.p. http://www.sztolnia.pl
Current thread:
- Badware update through P2P? Michel Arboi (Jul 17)
- Re: Badware update through P2P? Rob Shein (Jul 17)
- Re: Badware update through P2P? Michel Arboi (Jul 17)
- Re: Badware update through P2P? Adam [wp-ckkl] (Jul 17)
- Re: Badware update through P2P? Fabien SPAGNOLO (Jul 17)
- Re: Badware update through P2P? Mark Robinson (Jul 17)
- Re: Badware update through P2P? Rob Shein (Jul 17)