|
You probably want to make a list of vulnerable
hosts that fall to exploits like this:
http://server-ip-here/scripts/../../winnt/system32/ping.exe Most DDoS zombies will use spoofed IP packets
to attack its victim, so filtering the source will not relief your
pain.
Rubens
|
- Monumentous task of making a list of all DDoS Zombi... Drew Weaver
- RE: Monumentous task of making a list of all D... Rubens Kuhl Jr.
- RE: Monumentous task of making a list of all D... Wayne Gustavus (nanog)
- Re: Monumentous task of making a list of a... Marshall Eubanks
- Re: Monumentous task of making a list of a... Suresh Ramasubramanian
- RE: Monumentous task of making a list ... Wayne Gustavus (nanog)
- Re: Monumentous task of making a l... Suresh Ramasubramanian
- Re: Monumentous task of makin... Sean Donelan
- Re: Monumentous task of m... Suresh Ramasubramanian
- Re: Monumentous task ... Iljitsch van Beijnum
- Re: Monumentous task ... Suresh Ramasubramanian
- Re: Monumentous task ... Iljitsch van Beijnum
