TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Hrvoje Mesing
from: Geo.
date: 2004-05-07 06:29:20
subject: Re: sasser worm (new)

From: "Geo." 

"Hrvoje Mesing"  wrote in
message news:409acd0a{at}w3.nls.net...

> Still, if there is _up.exe ran again, there is active 9996/5 port
> though which you can drop directly to shell. With telnet.

I don't think so, I think the initial stage one (the overflow exploit)
opens the port not the up.exe part that is downloaded via ftp.

it's like trying to catch a computer while it's booting. Not impossible but
not real easy either.

Geo.

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.