lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.NEB.4.44.0405031742500.2783-100000@kirk> From: alaoui_o at epita.fr (youssef ALAOUI) Subject: Unpacking Sasser HI, You can use PEiD to try to unpack Sasser (http://peid.has.it/) you can also catch this worm by creating a shell script called catch.sh catch.sh would contain two lines : nc -l -p 445 > ~/catched.dump$$ ./catch.sh & then you just have to launch it : ./catch.sh & that will create files with random names for each incomming connexion to port 445 containing a dump of the trafic in your home directory. Tek Rulez ------------------------------------ ALAOUI ABDELLAOUI Youssef alias ANALYSTE Delegue Promo 2008 -{Epitech}- European Institute of Technology