lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1085413294.29260.6.camel@coruscant.weisserth.net> From: tobias at weisserth.de (Tobias Weisserth) Subject: Bobax and Kibuv Hi "joe smith", On Mon, 2004-05-24 at 17:09, joe smith wrote: > Does anyone have a capture sample of Bobax and Kibuv? I'm doing an > analysis it. I search around and come up empty. Any variant is fine. I can't understand why it seems so hard to catch samples of worms that knock at my firewall 24/7. Just open the corresponding ports and forward them to a vulnerable machine on a different subnet (DMZ) and let the worms infect a machine you designated for this purpose. If you really want to analyse the virus you should be able and have the capacities to catch it out of the wild. You won't miss it. Believe me. And if that's impossible, then contact your antivirus company of choice and ask them. If you have a convincing reason then they'll gladly provide ;-) This list is not a supply warehouse for dubious "researchers" after all. regards, Tobias
Powered by blists - more mailing lists