[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <41533E7D.10000@joesmith.homeip.net>
From: joe at joesmith.homeip.net (joe smith)
Subject: unknown backdoor: 220 StnyFtpd 0wns j0
You can try scanning it if you have the file.
http://virusscan.jotti.dhs.org
Ryan Sumida wrote:
>
> Thank you all for the help, I definitily appreciate it. The last
> system I checked had ftp running on port 15708 which makes me believe
> it is not the WORM_KIBUV.B but a similar variant. Sorry for the
> unnecessary post, I googled the whole string which didn't come back
> with anything. I should have just googled "StnyFtpd".
>
> Thanks again,
>
> Ryan
>
> full-disclosure-admin@...ts.netsys.com wrote on 09/23/2004 10:42:13 AM:
>
> >
> > I've been finding a few compromised Windows systems on our campus that
> > have a random port open with a banner of "220 0wns j0". All
> > the systems seem to be doing SYN scans on port 445 and LSASS buffer
> > overflow attempts. Anyone know what worm/bot is doing this? I don't
> > have access to these machines so I can only get a network view of what
> > the systems are doing.
> >
> > Thanks,
> >
> > Ryan
Powered by blists - more mailing lists