-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Couple things to look for.
1.connections to IRC 2.are the names in the IRC connection random and look generated 3.time intervals 4.does it appear that the machines on the network are getting patched if you run a vuln scanner against them and once reported vuln? This should point you towards if its a bot/ worm. A lot of the bots use the lsass vuln. best of luck. giles On Thu, 23 Sep 2004 10:42:13 -0700 Ryan Sumida <[EMAIL PROTECTED]> wrote: >I've been finding a few compromised Windows systems on our campus >that >have a random port open with a banner of "220 StnyFtpd 0wns j0". > All the >systems seem to be doing SYN scans on port 445 and LSASS buffer >overflow >attempts. Anyone know what worm/bot is doing this? I don't have >access >to these machines so I can only get a network view of what the systems >are >doing. > >Thanks, > >Ryan time� is a trademark of Universe� Public use permited by fair use agreement ( copyright [NULL] ) -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.4 wkYEARECAAYFAkFTHWAACgkQUjm7xSZSd8G4MQCfaaDrN3OM2kYeAys2fLTMlceQJMcA oKxgR1ANxpZK6PrxKvxyLMfFwuZe =zS2x -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
