Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: RE: Bening Worms (Cosmin Stejerean)
From: Valdis.Kletnieks () vt edu
Date: Sat, 14 May 2005 14:31:14 -0400

On Sat, 14 May 2005 11:42:18 CDT, "Stejerean, Cosmin" said:

   You would probably only do something like this in case of an emergency.
In most cases there are a lot better ways to patch management than spreading
a worm of your own.

Describe an emergency scenario where writing and testing a worm to do your
network is superior to deploying either a honeypot back-attack-and-patch or
centralized scan-and-patch service?

Perhaps the best example of how this was used and why it should be done this
way unless it's an emergency is the problem with the Xerox researches in
1978 that used worms to automate tasks on their network. The code was
corrupted and over 200 machines crashed.

I think you meant "Why it *shouldn't* be done this way"?

Attachment: _bin
Description:

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]