[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <OF65AF2F07.303D3E17-ON88256F18.006DA96B-88256F18.007057DB@notesmail.csulb.edu>
From: rsumida at csulb.edu (Ryan Sumida)
Subject: unknown backdoor: 220 StnyFtpd 0wns j0
Thank you all for the help, I definitily appreciate it. The last system I
checked had ftp running on port 15708 which makes me believe it is not the
WORM_KIBUV.B but a similar variant. Sorry for the unnecessary post, I
googled the whole string which didn't come back with anything. I should
have just googled "StnyFtpd".
Thanks again,
Ryan
full-disclosure-admin@...ts.netsys.com wrote on 09/23/2004 10:42:13 AM:
>
> I've been finding a few compromised Windows systems on our campus that
> have a random port open with a banner of "220 0wns j0". All
> the systems seem to be doing SYN scans on port 445 and LSASS buffer
> overflow attempts. Anyone know what worm/bot is doing this? I don't
> have access to these machines so I can only get a network view of what
> the systems are doing.
>
> Thanks,
>
> Ryan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040923/1629dd55/attachment.html
Powered by blists - more mailing lists