Security Basics mailing list archives
infected message source identification
From: SMiller () unimin com
Date: Fri, 6 Aug 2004 12:35:29 -0400
We just intercepted an unusually large volume of MyDoom.O on our mail server. Looking over the Scanmail log, I see quite a few email addresses that appear to be valid, and a large number that contain odd strings. I have seen this before, and have assumed that the program scrubbing the hard drive for addresses is badly coded with the result that the "wrong" substrings from files are being recorded. While legitimate email addresses may be held in common across large numbers of computers, especially within an enterprise, the randomly recorded strings should be more unique. Any reports that someone has successfully tried to reverse-engineer the disk scrubbing process to identify the compromised machine by finding combinations of those strings? Any thoughts (other than those impugning my sanity for even considering such a thing;?) Scott --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ----------------------------------------------------------------------------
Current thread:
- infected message source identification SMiller (Aug 06)
