☀️ JOIN SPN MOBILE
Forums
New posts
Guru Granth Sahib
Composition, Arrangement & Layout
ਜਪੁ | Jup
ਸੋ ਦਰੁ | So Dar
ਸੋਹਿਲਾ | Sohilaa
ਰਾਗੁ ਸਿਰੀਰਾਗੁ | Raag Siree-Raag
Gurbani (14-53)
Ashtpadiyan (53-71)
Gurbani (71-74)
Pahre (74-78)
Chhant (78-81)
Vanjara (81-82)
Vaar Siri Raag (83-91)
Bhagat Bani (91-93)
ਰਾਗੁ ਮਾਝ | Raag Maajh
Gurbani (94-109)
Ashtpadi (109)
Ashtpadiyan (110-129)
Ashtpadi (129-130)
Ashtpadiyan (130-133)
Bara Maha (133-136)
Din Raen (136-137)
Vaar Maajh Ki (137-150)
ਰਾਗੁ ਗਉੜੀ | Raag Gauree
Gurbani (151-185)
Quartets/Couplets (185-220)
Ashtpadiyan (220-234)
Karhalei (234-235)
Ashtpadiyan (235-242)
Chhant (242-249)
Baavan Akhari (250-262)
Sukhmani (262-296)
Thittee (296-300)
Gauree kii Vaar (300-323)
Gurbani (323-330)
Ashtpadiyan (330-340)
Baavan Akhari (340-343)
Thintteen (343-344)
Vaar Kabir (344-345)
Bhagat Bani (345-346)
ਰਾਗੁ ਆਸਾ | Raag Aasaa
Gurbani (347-348)
Chaupaday (348-364)
Panchpadde (364-365)
Kaafee (365-409)
Aasaavaree (409-411)
Ashtpadiyan (411-432)
Patee (432-435)
Chhant (435-462)
Vaar Aasaa (462-475)
Bhagat Bani (475-488)
ਰਾਗੁ ਗੂਜਰੀ | Raag Goojaree
Gurbani (489-503)
Ashtpadiyan (503-508)
Vaar Gujari (508-517)
Vaar Gujari (517-526)
ਰਾਗੁ ਦੇਵਗੰਧਾਰੀ | Raag Dayv-Gandhaaree
Gurbani (527-536)
ਰਾਗੁ ਬਿਹਾਗੜਾ | Raag Bihaagraa
Gurbani (537-556)
Chhant (538-548)
Vaar Bihaagraa (548-556)
ਰਾਗੁ ਵਡਹੰਸ | Raag Wadhans
Gurbani (557-564)
Ashtpadiyan (564-565)
Chhant (565-575)
Ghoriaan (575-578)
Alaahaniiaa (578-582)
Vaar Wadhans (582-594)
ਰਾਗੁ ਸੋਰਠਿ | Raag Sorath
Gurbani (595-634)
Asatpadhiya (634-642)
Vaar Sorath (642-659)
ਰਾਗੁ ਧਨਾਸਰੀ | Raag Dhanasaree
Gurbani (660-685)
Astpadhiya (685-687)
Chhant (687-691)
Bhagat Bani (691-695)
ਰਾਗੁ ਜੈਤਸਰੀ | Raag Jaitsree
Gurbani (696-703)
Chhant (703-705)
Vaar Jaitsaree (705-710)
Bhagat Bani (710)
ਰਾਗੁ ਟੋਡੀ | Raag Todee
ਰਾਗੁ ਬੈਰਾੜੀ | Raag Bairaaree
ਰਾਗੁ ਤਿਲੰਗ | Raag Tilang
Gurbani (721-727)
Bhagat Bani (727)
ਰਾਗੁ ਸੂਹੀ | Raag Suhi
Gurbani (728-750)
Ashtpadiyan (750-761)
Kaafee (761-762)
Suchajee (762)
Gunvantee (763)
Chhant (763-785)
Vaar Soohee (785-792)
Bhagat Bani (792-794)
ਰਾਗੁ ਬਿਲਾਵਲੁ | Raag Bilaaval
Gurbani (795-831)
Ashtpadiyan (831-838)
Thitteen (838-840)
Vaar Sat (841-843)
Chhant (843-848)
Vaar Bilaaval (849-855)
Bhagat Bani (855-858)
ਰਾਗੁ ਗੋਂਡ | Raag Gond
Gurbani (859-869)
Ashtpadiyan (869)
Bhagat Bani (870-875)
ਰਾਗੁ ਰਾਮਕਲੀ | Raag Ramkalee
Ashtpadiyan (902-916)
Gurbani (876-902)
Anand (917-922)
Sadd (923-924)
Chhant (924-929)
Dakhnee (929-938)
Sidh Gosat (938-946)
Vaar Ramkalee (947-968)
ਰਾਗੁ ਨਟ ਨਾਰਾਇਨ | Raag Nat Narayan
Gurbani (975-980)
Ashtpadiyan (980-983)
ਰਾਗੁ ਮਾਲੀ ਗਉੜਾ | Raag Maalee Gauraa
Gurbani (984-988)
Bhagat Bani (988)
ਰਾਗੁ ਮਾਰੂ | Raag Maaroo
Gurbani (889-1008)
Ashtpadiyan (1008-1014)
Kaafee (1014-1016)
Ashtpadiyan (1016-1019)
Anjulian (1019-1020)
Solhe (1020-1033)
Dakhni (1033-1043)
ਰਾਗੁ ਤੁਖਾਰੀ | Raag Tukhaari
Bara Maha (1107-1110)
Chhant (1110-1117)
ਰਾਗੁ ਕੇਦਾਰਾ | Raag Kedara
Gurbani (1118-1123)
Bhagat Bani (1123-1124)
ਰਾਗੁ ਭੈਰਉ | Raag Bhairo
Gurbani (1125-1152)
Partaal (1153)
Ashtpadiyan (1153-1167)
ਰਾਗੁ ਬਸੰਤੁ | Raag Basant
Gurbani (1168-1187)
Ashtpadiyan (1187-1193)
Vaar Basant (1193-1196)
ਰਾਗੁ ਸਾਰਗ | Raag Saarag
Gurbani (1197-1200)
Partaal (1200-1231)
Ashtpadiyan (1232-1236)
Chhant (1236-1237)
Vaar Saarang (1237-1253)
ਰਾਗੁ ਮਲਾਰ | Raag Malaar
Gurbani (1254-1293)
Partaal (1265-1273)
Ashtpadiyan (1273-1278)
Chhant (1278)
Vaar Malaar (1278-91)
Bhagat Bani (1292-93)
ਰਾਗੁ ਕਾਨੜਾ | Raag Kaanraa
Gurbani (1294-96)
Partaal (1296-1318)
Ashtpadiyan (1308-1312)
Chhant (1312)
Vaar Kaanraa
Bhagat Bani (1318)
ਰਾਗੁ ਕਲਿਆਨ | Raag Kalyaan
Gurbani (1319-23)
Ashtpadiyan (1323-26)
ਰਾਗੁ ਪ੍ਰਭਾਤੀ | Raag Prabhaatee
Gurbani (1327-1341)
Ashtpadiyan (1342-51)
ਰਾਗੁ ਜੈਜਾਵੰਤੀ | Raag Jaijaiwanti
Gurbani (1352-53)
Salok | Gatha | Phunahe | Chaubole | Swayiye
Sehskritee Mahala 1
Sehskritee Mahala 5
Gaathaa Mahala 5
Phunhay Mahala 5
Chaubolae Mahala 5
Shaloks Bhagat Kabir
Shaloks Sheikh Farid
Swaiyyae Mahala 5
Swaiyyae in Praise of Gurus
Shaloks in Addition To Vaars
Shalok Ninth Mehl
Mundavanee Mehl 5
ਰਾਗ ਮਾਲਾ, Raag Maalaa
What's new
New posts
New media
New media comments
New resources
Latest activity
Videos
New media
New comments
Library
Latest reviews
Donate
Log in
Register
What's new
New posts
Menu
Log in
Register
Install the app
Install
Welcome to all New Sikh Philosophy Network Forums!
Explore Sikh Sikhi Sikhism...
Sign up
Log in
Discussions
Interfaith Dialogues
MSBlast W32.Blaster.Worm / LovSan : Removal Instructions
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="foxfire" data-source="post: 183" data-attributes="member: 81"><p><strong>History of this exploit/worm: </strong> </p><p></p><p>Around July 16th the Last Stage of Delirium (Polish 'White Hat' hackers) created 'proof of concept' (i.e. they actually executed a theoretical exploit) code to exploit a stack buffer overflow vulnerability in "Windows 2000 (sp 1-4), Windows XP (sp 1) and Windows 2003 Server (regardless of the service packs installed)" ( <a href="http://lsd-pl.net/special.html" target="_blank">http://lsd-pl.net/special.html</a> ). Special thanks go out to LSD for their responsibility in not releasing their code. Microsoft also thanks them. A pity their responsibility made little difference. </p><p></p><p>An American hacker and a Chinese hacking group (XFocus) released code for this exploit on July 25th ( <a href="http://www.xfocus.org/documents/200307/2.html" target="_blank">http://www.xfocus.org/documents/200307/2.html</a> ) without any code or special information to work with proving that with very vague details of an exploit malicious code can be created quickly, even without disclosure of the exploit's details. They only released code to work on 3 Windows Operating Systems but the code can easily be modified to use on the other vulnerable systems. </p><p></p><p>HD Moore (founder of the Metasploit Project) modified the code to exploit 7 operating systems. "I don't like broken exploits, so I fixed it," he said. He posted the code on a machine he hosted and was innundated with traffick and was taken offline. He had planned to disseminate the code off of a web server but I did not verify that it has happened. </p><p></p><p>The release of code to execute this exploit gave System administrators little time to patch and home users who are typically slower to do so even less. </p><p></p><p>Soon exploit tools were released allowing hackers to send commands through IRC networks. On aug 2nd the first traces of these attack programs were found but they were not worms. They did not self-propagate. </p><p></p><p></p><p>The next step was for someone to create a worm to tie into this exploit. </p><p></p><p>With the DefCon hacker convention on the weekend of Aug 2,3 it was widely expected that a worm would be released (not necessarily by people attending DefCon but simply because of the attention to hacking that the conference brings) that utilized this exploit. The Department of Homeland Security issued an alert on Aug 1st and the Federal Computer Incident Response Center (FedCIRC), the National Communications System (NCS) and the National Infrastructure Protection Center (NIPC) were keeping an eye out for the exploits. </p><p></p><p>The worm became an internet threat yesterday (Aug 11th). It was named "MSBlast" by its author. The Internet Storm Center ( <a href="http://isc.incidents.org/" target="_blank">http://isc.incidents.org/</a> ) has claimed that it is spreading quickly (my anecdotal evidence backs this up). By midafternood on Aug 11th at least 7000 machines had been compromised according to cnet. </p><p></p><p>This worm has not yet reached it's peak. It will be fine-tuned by other hackers and modified to become more dangerous. This morning some hackers were already claiming to do so in some IRC channels.</p></blockquote><p></p>
[QUOTE="foxfire, post: 183, member: 81"] [B]History of this exploit/worm: [/B] Around July 16th the Last Stage of Delirium (Polish 'White Hat' hackers) created 'proof of concept' (i.e. they actually executed a theoretical exploit) code to exploit a stack buffer overflow vulnerability in "Windows 2000 (sp 1-4), Windows XP (sp 1) and Windows 2003 Server (regardless of the service packs installed)" ( [url]http://lsd-pl.net/special.html[/url] ). Special thanks go out to LSD for their responsibility in not releasing their code. Microsoft also thanks them. A pity their responsibility made little difference. An American hacker and a Chinese hacking group (XFocus) released code for this exploit on July 25th ( [url]http://www.xfocus.org/documents/200307/2.html[/url] ) without any code or special information to work with proving that with very vague details of an exploit malicious code can be created quickly, even without disclosure of the exploit's details. They only released code to work on 3 Windows Operating Systems but the code can easily be modified to use on the other vulnerable systems. HD Moore (founder of the Metasploit Project) modified the code to exploit 7 operating systems. "I don't like broken exploits, so I fixed it," he said. He posted the code on a machine he hosted and was innundated with traffick and was taken offline. He had planned to disseminate the code off of a web server but I did not verify that it has happened. The release of code to execute this exploit gave System administrators little time to patch and home users who are typically slower to do so even less. Soon exploit tools were released allowing hackers to send commands through IRC networks. On aug 2nd the first traces of these attack programs were found but they were not worms. They did not self-propagate. The next step was for someone to create a worm to tie into this exploit. With the DefCon hacker convention on the weekend of Aug 2,3 it was widely expected that a worm would be released (not necessarily by people attending DefCon but simply because of the attention to hacking that the conference brings) that utilized this exploit. The Department of Homeland Security issued an alert on Aug 1st and the Federal Computer Incident Response Center (FedCIRC), the National Communications System (NCS) and the National Infrastructure Protection Center (NIPC) were keeping an eye out for the exploits. The worm became an internet threat yesterday (Aug 11th). It was named "MSBlast" by its author. The Internet Storm Center ( [url]http://isc.incidents.org/[/url] ) has claimed that it is spreading quickly (my anecdotal evidence backs this up). By midafternood on Aug 11th at least 7000 machines had been compromised according to cnet. This worm has not yet reached it's peak. It will be fine-tuned by other hackers and modified to become more dangerous. This morning some hackers were already claiming to do so in some IRC channels. [/QUOTE]
Insert quotes…
Verification
Post reply
Discussions
Interfaith Dialogues
MSBlast W32.Blaster.Worm / LovSan : Removal Instructions
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top