lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <m33cg6m49n.fsf@worst-case.niehaus.dynodns.net> From: killedbythoughts at mindcrime.net (Sebastian Niehaus) Subject: Re: Windows Dcom Worm planned DDoS martin f krafft <madduck@...duck.net> writes: > also sprach Sebastian Niehaus <killedbythoughts@...dcrime.net>: > > Could be a nice feature of a worm to modify the "hosts" file and > > prevent infected maschines to do DNS lookups. > > Unless you use a rooted host for that, it would reveal your > identity. And if you use a rooted host, you run the risk of the worm > failing if you loose control over the host. So we need a daemon to fetch the "hosts" file from somwhere (IRC?)<w
Powered by blists - more mailing lists