| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.NEB.4.44.0405031742500.2783-100000@kirk>
From: alaoui_o at epita.fr (youssef ALAOUI)
Subject: Unpacking Sasser
HI,
You can use PEiD to try to unpack Sasser (http://peid.has.it/)
you can also catch this worm by creating a shell script called catch.sh
catch.sh would contain two lines :
nc -l -p 445 > ~/catched.dump$$
./catch.sh &
then you just have to launch it : ./catch.sh &
that will create files with random names for each incomming connexion to
port 445 containing a dump of the trafic in your home directory.
Tek Rulez
------------------------------------
ALAOUI ABDELLAOUI Youssef alias ANALYSTE
Delegue Promo 2008
-{Epitech}- European Institute of Technology