Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: New REmote Windows Exploit (MS04-029)
From: KF_lists <kf_lists () secnetops com>
Date: Thu, 04 Nov 2004 14:36:55 -0500

Um... Yeah... thats gonna stop him. It takes all of about 2 minutes to setup a new email address and resend.

Also who said the message was not spoofed?
-KF


raza wrote:
So have we identified the sender of the list and banned him from the
Mailing List.?

Raza

-----Original Message-----
From: full-disclosure-admin () lists netsys com
[mailto:full-disclosure-admin () lists netsys com] On Behalf Of Vincent
Archer
Sent: 04 November 2004 14:31
To: Ferdinand Klinzer
Cc: full-disclosure () lists netsys com
Subject: Re: [Full-disclosure] New REmote Windows Exploit (MS04-029)

On Thu, Nov 04, 2004 at 02:32:33PM +0100, Ferdinand Klinzer wrote:

It´s a simple perl script...

and i don´t think you can call it an remote exploit?


It's more subtle than you think.

The "exploit" is supposed to try to open a cmd tool on 31337 (eleet) on
a target Windows. It fails; the window system is secure... but
meanwhile,
there's a perl IRC bot running in the background of *your* system.

It's not a remote exploit, it's a trojan targeting the readers of this
list.


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault