>From personal experience here:

We had about 25 machine around the state defaced.  2 of those machines had
backdoor programs installed.  All the defacements looked the same so don't
assume anything.

Beth     

-----Original Message-----
From: Eric Robinson [mailto:[EMAIL PROTECTED]]
Sent: Friday, May 25, 2001 12:09 PM
To: Elizabeth Zwicky; Jose Nazario
Cc: [EMAIL PROTECTED]
Subject: RE: f**k USA government f**k poizonbox


Have you checked around to see what analysts in various places have said
about the true nature of the attack? Have there been reports of different
versions of the attack that do more than I stated?

Eric Robinson
Network Architect
edurus, Inc.
www.edurus.com

-----Original Message-----
From: Elizabeth Zwicky [mailto:[EMAIL PROTECTED]]
Sent: Friday, May 25, 2001 10:05 AM
To: 'Eric Robinson'; Jose Nazario
Cc: [EMAIL PROTECTED]
Subject: RE: f**k USA government f**k poizonbox



> There comes a point at which you have to ask yourself, "Was I
> just one of
> several thousand identical victims, or did some hacker want
> to get into my
> particular web server so badly that he timed his attack to
> coincide with a
> larger world-wide event as a cover?"

Or, of course, you could ask yourself "Hey, since I know that
more than one person ran these attacks, is it possible that
different people used slightly different variations of
the attack, some of which left behind back doors?"
You could answer this question "No, no hacker would ever
take advantage of a political protest to hide back doors
on machines, and every single attack in these thousands
is from exactly the same software" but on the whole, I'd
have to regard that as a strange thing to believe.

        Elizabeth Zwicky
        [EMAIL PROTECTED]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to