Full Disclosure mailing list archives

Re: IIS 5.0 Webdav Rootkit


From: <defaillance () hushmail com>
Date: Sun, 6 Apr 2003 11:37:12 -0700


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Now what does this "bundle" has to do with a rootkit ?
afaik rootkits intercept calls () hide files and process
and more... your package is simply a few batch file to
automate the process of having nc listening on a port and
launching the compiled exploit !

Am i missing something on your post or this is just
a way to provide clueless wanna be with some recent exploit  ?

MattĀ“


-----BEGIN PGP SIGNATURE-----
Version: Hush 2.2 (Java)
Note: This signature can be verified at https://www.hushtools.com/verify

wmAEARECACAFAj6Qc9UZHGRlZmFpbGxhbmNlQGh1c2htYWlsLmNvbQAKCRAAqpYJlh8f
xbppAJ4tva/CGRu4IfBAWzWCDJrb9CrtgQCdEme0e5YYq+r7hJuZ3+nwX+T7jTU=
=311X
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2 

Big $$$ to be made with the HushMail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: