I actually wrote a script to do something like this, though I'm not sure
what I did with it.  I gave up on it because I felt that it was a legal
risk.  It wasn't destructive, just issued the beloved "net stop" command so
the remote machine would quit attacking me.  Still, a lawsuit would suck.

-----Original Message-----
From: Kevin O'Gorman [mailto:[EMAIL PROTECTED]] 
Sent: Friday, January 25, 2002 10:02 AM
To: [EMAIL PROTECTED]
Subject: Re: code red retaliations


On Fri, Jan 25, 2002 at 12:39:36PM -0500, Douglas J Hunley wrote:
> I cant sem to find the old copy of the code red retaliation I had. 
> However, a
> quick search on google.com for code red counter and/or nimda counter turns
up 
> plenty of links to code to turn an attacking machine into the one being 
> attacked
> -- 

Hmmm.  I've never seriously considered doing anything like this, but I've
been getting so many code red and nimda attacks that it's beginning to tempt
me.

However, I wonder about both the ethics and legalities of this.  You know
that a normal attacker is subject to legal sanctions in the USA?  At least
in theory, and occasionally in practice.  I'm not convinced that retaliation
would be a legal defense (let alone moral) for an attack, particularly on a
system that was already more victim itself than a culprit.

Comments?

++ kevin



-- 
Kevin O'Gorman  (805) 650-6274  mailto:[EMAIL PROTECTED] Permanent e-mail
forwarder:  mailto:Kevin.O'[EMAIL PROTECTED]
At school: mailto:[EMAIL PROTECTED]
Web: http://www.cs.ucsb.edu/~kogorman/index.html
Web: http://kosmanor.com/~kevin/index.html

"Life is short; eat dessert first!"
_______________________________________________
Linux-users mailing list - http://linux.nf/mailman/listinfo/linux-users
Subscribe/Unsubscribe info, Archives,and Digests are located at the above
URL.
_______________________________________________
Linux-users mailing list - http://linux.nf/mailman/listinfo/linux-users
Subscribe/Unsubscribe info, Archives,and Digests are located at the above URL.

Reply via email to