The kiddies have finally exploited the RPC SS/RPC DCOMII exploits that microsoft 
patched after internal auditing. I first got word of a working exploit about a week 
ago, but no real confirmation, and I put very little creedance in "<kiddie> I hax0rz 
your b0x3n!" then scanning went exponentially through the roof.  So it lookss like the 
kiddie's right, I doubt there's a virus perse, more like kiddies hunting for 
vulnerable boxes to install DDoS trojans on.  Anyone who honeypots one of these scans 
and gets a trojan please notify me and forward it, it would be most helpful. (Also 
obviously forward to Symantec et al.)


On Fri, 10 Oct 2003 13:26:58 -0400
Peter John Hill <[EMAIL PROTECTED]> wrote:

> 
> I am seeing lots of scanning of port 135 on my network. 66 byte long packets. Anyone 
> have a name for this? It is less aggressive than the welchia 
> scans I have seen. Seems to scan at about 3000 or so flows per 5 minutes.
> 
> Thanks
> Peter Hill
> Network Engineer
> Carnegie Mellon
> 


-- 

Andrew D Kirch  |           [EMAIL PROTECTED]            | 
Security Admin  |  Summit Open Source Development Group  | www.sosdg.org


Reply via email to