| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Windows PowerShell |
From: "Geo."
The way you get in with a worm typically is by executing some simple code
that then downloads the worm executable, sort of like a bootstrap
operation. Things like scripting make it easier to do that stage one and
get the download going.
Granted, not always required as an example sql server worm didn't need to
use this technique, but most do. Certainly the latest NT worms including
the ones that hit NT4 machines use this technique. They also use other
handy stuff like ftp.exe or tftp.exe. The more capabilities the easier it
is to infect a system.
That's why the old macs were considered so secure, there just wasn't much
to work with. It's also why if linux gets much more popular the virus
problem there will be far worse than anything we've seen on windows.
Geo.
"Rich" wrote in message news:45d1e42e$1{at}w3.nls.net...
That's what I meant by "bypass the user". Makes no difference.
Rich
"Geo." wrote in message
news:45d19efa$2{at}w3.nls.net...
think worms not trojans. no user required.
Geo.
"Rich" wrote in message news:45d131f1$1{at}w3.nls.net...
Why? If you can fool or bypass the user to run a program you may as
well
run a native program.
Rich
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 5030/786 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.