"J. Dow" a écrit :

> From: "neugens" <[EMAIL PROTECTED]>
> > Yesterday I opened my http to the world to give the opportunity to a friend
> > to try a java applet I wrote. I opened the doors for just ten minuts, and I
> > received 3 attempt from code red to exploit. It was code red, not nimda, I'm
> > sure, but that's not important.
> >
> > Ok, I know this Idea may sound bad, or "lamer oriented".
> > I only like to know if it is possible to:
> >
> > Take a chart of infected site and write a new worm. The worm may force to
> > patch IIS if it founds holes, or may carry the code to erase code "color",
> > nimda and all these stupid NT related "issues".
>
> There is an anti-Code Red "tool" floating around that disinfects an infected
> box.
>
> Really, guys, you should visit http://www.incidents.org for "just a whole LOT
> of goodies" like the uninfect worm, the laBrea tarpit tool, and lots of other
> good security tools.
>
>

If you try to patch a box you don't own you could be sued.   I have a better
idea:
write a worm who mails to the ISP asking for the site being shut down.
Given the looong list of problems with ISS  and NTwe can tell those people are
endangering the Internet and the whole system of email and ecommerce.
Since there is a distinct possibility
the Internet being hit by a cyberterrorist massive DDOS attack we can no longer
be tolerated.  During WWII those who didn't respect the blackout rules were
fined (or worse) since their lights helped ennemy bombers and endangered
whole cities.   Since USA are in war against terrorism and by applying the same
reasonment they should not tolerate IIS on the net.    Time to blackout windows.

                    JFM



_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list

Reply via email to