lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: syke at mantissecurity.net (Syke) Subject: Wanted: Sasser executable and derivatives Bob Perriero wrote: >If you really want viruses to study, it's not so difficult to put up >an unpatched windows system directly attached to your cable modem (no >firewall/router) and let it sit overnight. I'm sure that you will get >more viruses than you'll ever need. Then simply load up knoppix or >knoppix-std and retrieve all your files. > >-Bob > > >----- Original Message ----- >From: The Central Scroutinizer <scroutinizer@...b.net> >Date: Sat, 26 Jun 2004 17:50:00 +0100 >Subject: [Full-Disclosure] Wanted: Sasser executable and derivatives >To: full-disclosure@...ts.netsys.com > > >Hi again, > >Would you please send any executables direct to me, zipped and encoded >with a password in order to get through my e-mail anti virus software, > >Many thanks > >CS > >_______________________________________________ >Full-Disclosure - We believe in it. >Charter: http://lists.netsys.com/full-disclosure-charter.html > > > Wouldn't it be easier to use honeyd(www.honeyd.org) with an LSASS or mydoom script? That way you can just check the logs for the binaries that were uploaded? -- Syke, Founder of Mantis Security Networks http://www.MantisSecurity.net Bringing Security To New Standards
Powered by blists - more mailing lists