lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: tuevsec at gmx.net (Thomas Springer) Subject: RE: Full-Disclosure digest, Catching Sasser RTFM - the 4digit-number mentioned is random. maybe it'll help to expand your script to try 9999 combinations or scan 10.000 infected hosts. It shouldn't be much of a problem to find them - we still experience >50 different sasser-ips per second hammering our firewall. tom RandallM wrote: > <|>---------ftp_commands------ > <|>open <infected m/c IP> 5554 > <|>anonymous > <|>user > <|>bin > <|>get 7584_up.exe