Home page logo

basics logo Security Basics mailing list archives

Code Propagation ?
From: "Prasad Athawale" <athawale () buffalo edu>
Date: Mon, 15 Mar 2004 12:37:48 -0500

I wanted to know if someone has heard/knows about an instance of code
propagation, in which the process (some network monitoring daemon etc) would
replicate itself to say a new machine on the network and would function in
the following manner:
A host which previously did not have such a process legitimately joins the
network, and hence has to adhere to the network policy in effect – which
requires this process to be running on each host.
A copy of  the ‘Process’ running on a host (which has to be aware of all
currently joined hosts) – realizes this and ensures a copy of this process
is transferred and implemented on the new host – without the need to
physically touch the machine.
Also it might be possible for the sysadmin to maybe conduct system
maintenance tasks on the machines by giving commands etc.
Could someone give me some pointers on this? Any practical implementations
etc. that might be known? Techniques which might help? Calling for advice!
Thanks in advance,

Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less
to facilitate one-on-one interaction with one of our expert instructors.
Attend a course taught by an expert instructor with years of in-the-field
pen testing experience in our state of the art hacking lab. Master the skills
of an Ethical Hacker to better assess the security of your organization.
Visit us at:

  By Date           By Thread  

Current thread:
  • Code Propagation ? Prasad Athawale (Mar 16)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]