lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: roelof at sensepost.com (Roelof Temmingh) Subject: Mydoom: perfect storm averted or just ahead? > 2. It would be difficult for a malicious programmer, cyber terrorists or > cyber activists to target a specific environment and protect others ( Eg., > launch denial of service against SCO.com because I like LINUX and don’t like > SCO legal actions. Protect my computer at Berkley.edu because I don’t want > to effect my own Email.) Programmers can easily modify code and launch an > attack against another environment. Not sure I totally agree here. While it is difficult to target a specific network or system with worm technology it is possible - to an certain extent at least. Refer to http://www.sensepost.com/misc/bh2003lv.doc for some ideas on how that could be done. The document describes attacks that are wide-spread, yet focussed - it was presented at BlackHat, Las Vegas, 2003. my 1c, Roelof. ===================== Roelof Temmingh roelof@...sepost.com +27 12 667 4737 GMT+2 =====================
Powered by blists - more mailing lists