[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Sea1-DAV20Odutox7ny00001dd7@hotmail.com>
From: jeremiahcornelius at hotmail.com (Jeremiah Cornelius)
Subject: MsBlaster Source?
Subject: [Full-Disclosure] MsBlaster Source?
> Can anyone, who is obviously better at coding then I, verify the rumours
that the following link, is the source to msblaster?
>
This is Xteam's posting of a MSBlaster cleaner - I think. I don't
read/speak Chinese of any dialect!
Xteam is the source to the immediate antecedent to the dcom.c exploit used
in MSBlaster. This code was refined, and posted at the illmob site.
Blaster uses the exploit, but adds a transport mechanism and payload.
See my timeline post to this list and MORNING_W00D for details...
--
Jeremiah Cornelius, CISSP, CCNA, MCSE
farm9.com Security
Powered by blists - more mailing lists