Security Incidents mailing list archives

Re: What "methods" are being used


From: fuska <fuska () phreaker net>
Date: Mon, 14 May 2001 20:06:07 +0200



A little more info to add about the IIS part of the attack...

The following files were created in C:\

05/07/01  05:41a                   289 default.asp
05/07/01  05:41a                   289 default.htm
05/07/01  05:41a                   289 index.asp
05/07/01  05:41a                   289 index.htm

The same files were created in C:\InetPub and every subdirectory under
C:\InetPub.

A question...  How did they automate the creation of these files in every
\InetPub subdirectory?  I can't think of a simple command line to do that.


  Take a look at these pages:

        http://www.zdnet.com/intweek/stories/news/0,4164,5082732,00.html
        http://attrition.org/security/commentary/worm01.html


Current thread: