Vulnerability Development mailing list archives
Re: Publishing Nimda Logs
From: Jose Nazario <jose () monkey org>
Date: Tue, 7 May 2002 13:43:58 -0400 (EDT)
On Tue, 7 May 2002, Deus, Attonbitus wrote:
Input appreciated.
this is significantly worse than you may realize. since they all have an effective back door, its very easy to walk around and pick them up for a DDoS attack. you'd literally be handing them to people. granted all one has to do is listen for nimda/CR/CR2 scans and you have a good chunk ready to run with. however, your actions would explicitely enable and assist this. i highly suggest you don't do this. i suggest instead you attempt to work with CERT and other organizations through a group like FIRST to try and clean this up. ___________________________ jose nazario, ph.d. jose () monkey org http://www.monkey.org/~jose/
Current thread:
- RE: whois tricks was : Publishing Nimda Logs, (continued)
- RE: whois tricks was : Publishing Nimda Logs Steve Zenone (May 08)
- Re: whois tricks was : whois is what? Matthew McGehrin (May 08)
- RE: whois tricks was : whois is what? Steve Zenone (May 09)
- Re: Publishing Nimda Logs Bernie Cosell (May 08)
- Re: Publishing Nimda Logs Pavel Lozhkin (May 08)
- Re: Publishing Nimda Logs Bernie Cosell (May 07)
- RE: Publishing Nimda Logs Tech Support (May 07)
- Re: Publishing Nimda Logs Blue Boar (May 07)
- Re: Publishing Nimda Logs Bernie Cosell (May 07)
- Re: Publishing Nimda Logs Erik Fichtner (May 07)
- Re: Publishing Nimda Logs Ron DuFresne (May 07)
- Re: Publishing Nimda Logs Lincoln Yeoh (May 08)
- RE: Publishing Nimda Logs Andy Wood (May 08)
- Re: Publishing Nimda Logs Nick Lange (May 08)