Vulnerability Development mailing list archives
Re: Publishing Nimda Logs
From: Lincoln Yeoh <lyeoh () pop jaring my>
Date: Thu, 09 May 2002 03:16:44 +0800
Would /scripts/root.exe catch enough of the varieties out there? --- Option 5:Is it possible to shutdown the server remotely? Even if they don't have the NT resource kit installed.
I mean if a victim's server keeps shutting down regularly, I'm sure they'll patch it after a while :). If they don't notice, it stays down and doesn't bother anyone else.
Of course this is illegal and unethical. But even that messaging thing could be considered illegal.
Cheerio, Link. At 12:36 PM 5/7/02 -0700, Jonathan Bloomquist wrote:
How about another option (4. warn the infected) as proposed in this slashdot post (text follows): http://slashdot.org/comments.pl?sid=21830&cid=2329699 I made a PHP script, by modifying a similar one used for Code Red. First make a "scripts" directory in your web server's root directory. Now put this into a file called "root.exe"
Current thread:
- Re: Publishing Nimda Logs, (continued)
- Re: Publishing Nimda Logs Bernie Cosell (May 07)
- RE: Publishing Nimda Logs Tech Support (May 07)
- Re: Publishing Nimda Logs Blue Boar (May 07)
- Re: Publishing Nimda Logs Bernie Cosell (May 07)
- Re: Publishing Nimda Logs Erik Fichtner (May 07)
- Re: Publishing Nimda Logs Ron DuFresne (May 07)
- Re: Publishing Nimda Logs Lincoln Yeoh (May 08)
- RE: Publishing Nimda Logs Andy Wood (May 08)
- Re: Publishing Nimda Logs Nick Lange (May 08)
- RE: Publishing Nimda Logs Andy Wood (May 08)
- RE: Publishing Nimda Logs Jose Nazario (May 08)