Code Blue fights back against Red
- Book ID
- 104391508
- Publisher
- Elsevier Science
- Year
- 2001
- Tongue
- English
- Weight
- 151 KB
- Volume
- 2001
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
β¦ Synopsis
said: ``I'm pleased by the fact the Royal Canadian Mounted Police and FBI demonstrated this type of activity can be tracked and a successful prosecution can resultβ¦This is perhaps more important than the actual sentence since many hackers don't seem to believe they'll ever be prosecuted.''
Virus News
Linux Trojan in the wild
A Linux-based Trojan has been spotted doing the rounds across the Internet.
Remote Shell, as it is known, resembles Back Orifice in the Window's environment.
It installs a backdoor that listens for incoming connections on UDP port 5503 or higher, enabling remote attackers to connect and take control of a system.
Because the code uses a buffer overflow to access a system, there is limited space available for a payload. So, after infecting a machine, the rogue code calls home to a UK-based website to pick it up. This site will therefore have a definitive list of all vulnerable machines -the logical extension of this capability is to use it for a distributed denial-of-service attack.
The weakness in the system seems to be propagation, which is by email or using shared drives. Paul Mellen from Qualys told Network Security that Remote Shell Trojan: "Is a peculiar Triojan in that it is typically a one-off
π SIMILAR VOLUMES