
Code Red II: Shells for the Taking 602
sigurdur writes "It seems there is a new and more malicious version of Code Red out there. This one seems to try and copy cmd.exe into a position where it is accesible to us all - the scripts directory. So far I have seen it reported on the intrusions-list at incidents.org where they also just put up a notice about this third generation Code Red worm." I still think sircam is more annoying since it affects every email user, and not primarily poorly administered websites. But imagine how much bandwidth Code Red and Sircam have wasted in the last few weeks?
Oh god this is too much fun! (Score:2)
I mean, errr, hypothetically it would be possible to do such things, uhhh yeah.
Help track this: submit your logs to dshield! (Score:5, Informative)
Submissions can be made by following these instructions [dshield.org].
Re:Help track this: submit your logs to dshield! (Score:2)
Also interesting is the statistic associated with this listing, 31526/2
The first number is the number of "lines implicating this attacker", the second "number of targets attacked".
Does this mean only two hosts reported an attack, but over 30,000 times?
For comparison, 202.75.141.158 is now in first place with 97657/56947
Re:Help track this: submit your logs to dshield! (Score:4, Informative)
I'm on 56k ppp dialup, so I shouldn't see any attacks (let alone packets) not destined for my machine. Now that you know that, you should also know that I was rejecting all connections to port 80 with ipchains. Therefore, since the worm couldn't connect, it wouldn't transmit the HTTP request that snort is watching for.
By hanging netcat on port 80 with a 3 second connect limit using xinetd, all inbound port 80 probes get connections. They send their payload, snort alerts on it, netcat routes it directly to
I shunt the payloads directly to
Bandwidth (Score:4, Insightful)
I kind of find myself wondering, which wastes more bandwidth: the virus itself of all of the discussion about the virus?
I'm assuming the virus wastes vastly more. That said, take a look at the way every news site is covering it, the large images they have accompanying the stories and the vast numbers of people reading them because MSN messenger tells them it's important. I don't know if there is any way of measuring the bandwidth wasted by each but it'd be an interesting ratio to see, if there was.
Re:Bandwidth (Score:4, Insightful)
But if all the news, the discussion and similar are useful to make sysadmins a little smarter and make them use less vulnerable servers, or at least keep security patches up to date, I think that is not "waste".
Killing small ISPs (Score:5, Informative)
First one of the top dogs in the place sent sircam throughout the company. This was a really bad hair day.
Then they had a separate second problem where user mail boxes flooded out crashing the mail server, among other strange things. Imagine users with DSL lines sending out multimegabyte files that bounce. Considering that most ISPs configure the drive space for mail based on average usage of users, and do not set aside the actual amount of drive space for user mail, etc. that has been promised for all users.
BOOM!
If this keeps happening, this is going to be bad for business in a lot of places.
Re:Killing small ISPs (Score:2)
I know of at least one small ISP that had very serious problems this week. First one of the top dogs in the place sent sircam throughout the company
I have absolutely no sympathy for them. It's maybe understandable when someone from completely outside a computer-related field propogates a virus like that. But anyone at an ISP should know better. I don't care if they are in a non-technical position there; they still should have a basic understanding of what their company does. And the most basic understanding is all you need to not be infected.
Re:Killing small ISPs (Score:2, Interesting)
CNN story about Ukraine President getting SirCam. [cnn.com]
Newsbytes story about FBI agent w/SirCam. [newsbytes.com]
Re:Killing small ISPs (Score:2)
Re:Killing small ISPs (Score:2)
In any case, since Microsoft doesn't insall it easily, too few Win9x/Me boxes are running Personal Web Server. I don't think it even includes the vulnerable Index Server component.
Code Red II (or III) on cable modem segments (Score:2, Interesting)
Anyways, if cable modem users are seeing drastically increased ARPing, the targeting of the Code Red III variant should explain it -- hitting non-existent addresses on your subnet will cause the CMTSheadend router to ARP out to see who's got that address, you get the picture.
At the very least, it's a good opportunity for users to see how many modems your provider has packed onto your segment. If they've packed too many on there, you can be sure the CMTS router's going to get seriously bogged down.
I have an automated program which sends the IP addresses to the ARIS list *and* to my ISP's security department (those IP's which fall under their management) -- I wonder if ISP's are considering just dropping all packets from infected hosts, so when the customer comes to them and complains, they say "Oh, you're infected, reboot, install the patch, and we'll reconnect you." Seems that this would reduce the load on the CMTS and would be faster than trying to track down each customer individually.
Chad Loder
Rapid 7, Inc. - Next generation security products and services
http://www.rapid7.com [rapid7.com]
This will put a bandaid on the problem: (Score:2, Informative)
GET
GET
GET
GET
GET
GET
this way it renames the old root.exe, creates a new dummy one, and write protects it so it can't be overwritten by a simple copy command.
Bandwidth wasted? (Score:2)
So unless it caused noticable congestion it makes no difference in that respect.
Code Red Infects Slashdot! (Score:5, Funny)
Re:Apache users Create default.ida 5mb!!!! (Score:2, Interesting)
Re:Apache users Create default.ida 5mb!!!! (Score:3, Interesting)
Re:Origin of Code Red? (Score:2, Funny)
Re:Origin of Code Red? (Score:2)
A Pepsi product (mountain dew), actually
crack the code [mountaindew.com]
Tastes like cough syrup but has a pretty good kick (hate to think about what that much red food color does to your internal organs though).
Re:Code Red Infects Slashdot! (Score:2)
I hate to defend Micro$oft, but at least in this instance, they are only a nuisance to themselves (and to their customers). Indeed, Code Red only infects IIS, not Apache nor any of the many other brands of Webservers. And please don't bring out that old canard of CodeRed eating bandwidth and bringing the Internet to a crawl: this one has been debunked here [bbc.co.uk]: the real reason for the July 10th slowdown was... a train wreck!
Re:Microsoft Internet Pollution - My Server Log! (Score:4, Interesting)
Actually, there has been a beneficial effect with CodeRed (in the UK at least). I have seen several reports on British network news programmes that talk about "security flaws in M$ software", not "security flaws in the Internet". It's quite a step forward for the media here not to treat M$ software and Internet / PC software as being effectively synonymous. There is a faint but real message that the problem is Microsoft.
Finger of God (Score:2, Funny)
File download script (Score:5, Interesting)
I played around for a few hours with this, trying to make a ghetto script that would fix the servers. There's no way for me to be sure my other stuff works, but the thing I did get working was a script to download files to the infected server from an ftp site.
#!/bin/sh
# Code Red ][ Download File script
# Usage: dlfile.sh infectedIP filename
#
# Please set the $ftp and $dir values to
# the ftp and directory of the patch and shutdown repository
# For ftp.youhavesetup.com
FTP="ftp%2eyouhavesetup%2ecom"
# Directory
DIR="%2fpub%2fcr"
echo GET
sleep 1
echo GET
sleep 1
echo GET
# Note that slashcode inserts a space in the string 'tmpfile' on both these lines, remove before running
sleep 1
echo GET
I tried setting it up and got the servers to download the patches, but I can't be sure that they are actually run. (I don't have an infected machine to test.) Also, I was unable to figure out a way to get the machines to reboot or restart IIS. It appears root.exe has limited permission in what it can do (as another poster or two stated.) There might be hacks that will do what I want to, but I'm too tired to mess with this anymore
Re:File download script (Score:2)
The idea is nice, the intention is louvable, but I believe it would be considered illegal in most countries. After all, you are actually using their machine without permission.
The argument that you're doing this for their own good is the same one that crackers use.
-"Oh, we're doing them a favour, showing their vulnerabilities."
Re:File download script (Score:3, Interesting)
The intention isn't the same as crackers though, writing a script to patch and restart IIS not an in your face "showing their vulnerabilities" crack, it's basically a free-of-charge windows update complements of whoever runs the script. I'm not saying that it is legal, but it's definitely not a "ha ha I got rewt your windows box is insecure" crack. It a "I noticed your computer is insecure, I fixed it. Have a nice day, and don't let it happen again." crack.
If anyone actually sat and wrote a complex script to fix these computers, I *highly* doubt that a sane judge would pound the gavel on them, especially if the good they do is significant enough and measurable. (Personally, I would *love* to see someone outside of Microsoft do this before MS gets the chance to issue a fix and once again look like the good guys even though it's their original fuck up.)
Re:File download script (Score:2)
Are you sure? I mean, it's not like you're cracking into people's boxes randomly to do this; only computers that try to attack your Apache server are effected. Of course, thieves have successfully sued for unsafe property for injury themselves during attempted burglaries, so who knows...
Re:File download script (Score:2)
What if one were to change one's web server's main page to advertise an automated Code Red fixing service, conveniently located at http://www.example.com/default.ida?
I suppose it probably wouldn't hold up in court, but it'd still be amusing.
Re:File download script (Score:2)
If it was initiated by their machine (that is, by the default.ida request), that might be questionable, though. Not that *I'd* want to test it out in court, but I wouldn't dismiss it out of hand.
Re:File download script (Score:2, Informative)
Rebooting a compromised IIS server is trivial, just add this to your script
(echo "GET
or you could substitute iisreset/reboot with one iisreset/stop and one iisreset/start for less impact on the system.
Not a bug (Score:5, Funny)
CodeRed2 Explorer for your viewing pleasure (Score:3, Funny)
PLEASE MIRROR THIS and post your mirror URLs in reply to this message (subject Mirror of CodeRed2) since that server is a club server, low bandwidth, low budget. But very secure (Debian on Sparc and well maintained :-)
SlashDot (the pikers )-: wouldn't let me post directly to this page.
...and these machines are proud of it! (Score:4, Interesting)
Re:Not a bug (Score:2)
The tempation to dig some IPs from the logs and go for a wee look around at open machines is pretty intense (not that I'll be giving in, I hasten to add - bad ethics innit?) ... and it's at times like this I wish I'd gone to the effort of finding a commandline MTA for NT, though; it's a real pain manually looking up the POC & mailing them...
Try this (Score:3, Informative)
huge cable modem hits (Score:3, Redundant)
I've got a cable modem on nash1.tn.home.com, and my iptables log is seeing a huge number of hits (we're talking an average of several a minute, more or less) to port 80. Since I'm not actually running a web server, I don't have the logs that tell me if this is in fact Code Red, but I suspect that's what a huge amount of this activity is.
It's depressing, really.
-Rob
Re:huge cable modem hits (Score:2)
Re:huge cable modem hits (Score:2)
You aren't even supposed to send email to your job from an @home account. (no joke, tech support is adamant about that.) They have an @work package if you need to do business stuff.
In typical @home fashion, the upgrade to @work isn't available to all @home subscribers, because it is a DSL service, not cable modem... the coverage doesn't overlap 100%.
I'll keep violating the @home TOS quite happily, so long as they are dense enough to let me.
Re:huge cable modem hits (Score:2, Informative)
And I will now duck for all those people who will tell you you shouldn't install X on anything connected to the internet. Do a man on tcpdump to see what switch will save traffic to text-readable file.
Enjoy
Re:huge cable modem hits (Score:2)
Yes, I'm seeing an ungodly number of ARP requests as well, which may also be Code Red connected. (Who knows.)
-Rob
Re:huge cable modem hits (Score:2)
It's crazy.
onepoint
Re:huge cable modem hits (Score:2)
Mine too. I'm on AT&T Broadband/Road Runner/Whatever the hell they are calling themselves now.
I have a website up, so Apache is logging all hits on the site... it seems the access_log is only logging one attempt to access the site per infected host... the error_log indicates that the worm is actually hitting the site three times in quick succession (I think over a period of minutes). The only thing is, neither log really accounts for all the traffic that appears at the modem. Everything else is being blocked by the router/firewall appliance, which doesn't have great logging capabilities.
It looks like Red Alert recently hit a motherload of AT&T broadband sites, since I am seeing mostly sites hitting me that trace back to AT&T. Like another poster mentioned, you're not supposed to be running servers (so... sshh! I'm not running anything ;). I'm willing to bet a good number of people have an install of Windows 2000 or NT up with IIS installed and running by default. I bet most don't even know they are running a web server, much less that it's been infected. The few sites I tried to access that appear in my log all have the default "this page not available" thing, which is what I think IIS coughs up if you've not made some directory the server root.
I suspect one thing is that the DSL and cable companies may be prompted to crack down on servers hosted on their network. I mean, if they really wanted to enforce the ban, they can just do a sweep of their network and tell you to know it off or they will pull the plug. I wonder if they will actually start doing this.
Mountain Dew: Code Red (Score:2, Informative)
The Breaking Point (Score:5, Insightful)
What will happen? I don't know, but here are some possibilities:
Revolt against Microsoft software. We'd all love for this to happen, but their PR machine is probably too good. Still, we can always hope people realize that MS bears a large part of the responsibility here.
Lawsuit. Assuming the virus writers aren't found, the next logical targets will be Microsoft, and owners of a large number of infected hosts. Why it probably won't happen: suing Microsoft over this draws attention to the fact that your company's computer systems are insecure, and that your admins were too lazy/stupid to install the patch. Microsoft can always hide behind their patch, which was available well in advance, and claim that "everyone knows that bugs happen, and it's up to admins to keep up to date" (never mind that this contradicts their own marketing material--when has inconsistency ever stopped marketing before?). Suing somebody with a large bunch of infected hosts is also silly, since, to be infected by them, you have to be just as inept as them.
Government Intervention. Some state governors may push silly state bills, but they'll be irrelevant. What would really get interesting is if the Feds pass some sort of laws, either making people responsible for keeping their systems secure, or defining what kind of liability software manufacturers are exposed to in these circumstances (i.e., can you sue MS? For how much?). Why it probably won't happen. With Congress and Bush on vacation, not much will get done in at least the next month, and things will probably have come to a head before then. Only if this round does serious damage (perhaps the world's biggest DDoS against some high-profile targets, like Akamai), and another generation of Code Red pops up in September (just in time to catch all those college PCs with their pirated copies of Windows 2000 Server and high bandwidth), will this become a real possibility.
Internet Collapses. I really doubt it, I just had to say it to satisfy Cringley
So, which will it be, folks? This would make a great SlashPoll.
Re:The Breaking Point (Score:3, Insightful)
None of the above.
The two historical precedents that come to mind are:
Instead, what we'll see happen is more attention to security, taken in small steps. More people will subscribe to alert services, and they'll be willing to pay more for them. Bosses will start asking sysadmins what they've done for security today, and be more willing to sign purchase orders for security-related work. ISPs will pay a bit more attention to open ports on their home users, and some will scan their networks for known security vulnerabilities. OEMs configuring systems for naive users will discover that people will pay for a "safe out of the box" configuration, so they'll start to offer one. And so on, and so on....
The normal state for an economically useful thing is to be stressed, but not stressed to the breaking point. This should be pretty obvious: if it's not stressed, it was uneconomically overbuilt. We are very far from the breaking point for Windows.
Re:The Breaking Point (Score:4, Interesting)
Everybody wins.
Re:The Breaking Point (Score:3, Funny)
yeah, i laughed when i got a port 80 hit from cust2120.EzSecureHosting.com it's apparently not as secure as they would have people think, so customer 2120 could probably sue them.
and microsoft has the same "we make no guarantees" clauses that free software licenses have, so either the case would be dismissed, or clauses like that would be ruled illegal, which could be bad for free software, unless they only made it illegal to attach those clauses to commercial software
Re:The Breaking Point (Score:2)
Re:The Breaking Point (Score:2, Interesting)
And even the clueless ones who continue to use inherently defective software such as Outlook and IIS have as much right to sue MS as people who smoked for 50 years have to sue tobacco firms...
Re:The Breaking Point (Score:3, Insightful)
Well, you can quite rightly laugh at Mundie now for his audacity, but it's ridiculous to start calling for lawsuits against software makers. Do you really believe there is never going to be another exploit targeting open source software? Do you want the creators of that open source software to be sued too when that happens?
Microsoft is a big company, and it can afford lawsuits like that. But if, say, the creators of BIND were sued for an exploit, that would probably be the end of BIND. And it's unlikely anyone would be eager to write an open source replacement, with the threat of lawsuits looming over any potential open source project.
Re:The Breaking Point (Score:2)
Re:The Breaking Point (Score:3, Insightful)
Re:The Breaking Point (Score:3, Insightful)
Except that IIS still runs with admin priveledges. Nice try though.
Anyone still consider this a Microsoft problem? (Score:2)
I think the systems we're seeing infected now are either workstations with IIS installed and the user doesn't know/remember, or server with no real support staff sitting in a closet somewhere. Now the question is, will they EVER get patched?
Someone whip up a worm that patches systems. Be like a cyberwar from the movies. How cool is that?
Securityfocus asks for IPs (Score:5, Informative)
I am not a robot (Score:2)
Those are going to a shared e-mail alias. I get copies of everything, as well as a few other people. Unfortunately, because they are coming in many format types, we have to compile them by hand. But absolutely, please do send us the logs and have them in the format requested.
Re:Securityfocus asks for IPs (Score:2)
grep \?XXX
Automated notification script (Score:3, Interesting)
http://forum.swarthmore.edu/epigone/modperl/nehza
It identifies any attempt to access '/default.ida', looks up the MX records of the remote IP, and sends a notification to postmaster@. It is not a 'hack back', just a notification email.
Experiment (Score:2, Interesting)
Right now my NIC is flickering like mad, yet Windows 2000 does not show these as incoming or outgoing packets. What is going on?
Gnu/Sircam? (Score:2, Interesting)
If not, why not?
Re:Gnu/Sircam? (Score:2)
MIME attachments won't have the execute permission set, which means that a script would have to be saved to disk and executed by the user with the command
$ bash virus.sh
Or the user would have to set the execute permissions himself:$ chmod u+x virus.sh
$virus.sh
Granted, a mail reader could be written to do all of this itself after the user ``clicks'' on the attachment, but I am aware of none that exist at the present time that have that ``feature''.
Plus, since GNU/Linux (and all Unices) is a multi-user permissions based system, sircam would only be able to touch those files to which the user has read access. As long as the administrater isn't reading his mail as root, you'll never have to worry about some luser mailing his /etc/shadow to you.
So, until Microsoft writes a port Outlook and starts certifying ``Linux Engineers'', no, there won't be a sircam for GNU/Linux.
CmdrTaco runs Windows (Score:3, Funny)
I still think sircam is more annoying since it affects every email user
Every email user?!? CmdrTaco must run Windows. Let's get him!
Re:CmdrTaco runs Windows (Score:2)
I think the notion is that it affects non-Windows people as recipients of unwanted random files. (Code Red affects non-Windows people as port 80 hits, too, but that's relatively trivial, and unlikely for minimally-connected dialup people.)
Re:CmdrTaco runs Windows (Score:2)
Except that the strange HTTP requests it puts out cause problems with some embedded webservers...
Re:CmdrTaco runs Windows (Score:2)
Yabbut that's *still* not "all of us," as with SirCam.
Though, interestingly enough, I haven't seen SirCam. I run a mailing list server, and usually I get a nice sampling of darn near everything caught in the spamtrap... I saw Melissa from a European subscriber way in the wee hours of the morning, which was handy since my then-employer needed a sample to feed to its mail filter. And I still see Snowhite once every couple of days. But no SirCam.
Not that I'm complaining, mind you...
I'm sorely tempted . . . (Score:5, Insightful)
The more I think about it, the more it seems like a permissible act of self defense. It does no harm to the infected box (if the worm doesn't write itself to disk, as I've read, it actually helps) and prevents the infected box from being used to perpetuate more abuse.
Hmm . . .
Re:I'm sorely tempted . . . (Score:5, Insightful)
Re:I'm sorely tempted . . . (Score:5, Insightful)
Re:I'm sorely tempted . . . (Score:3, Insightful)
And while I'm not going to get cracked by the worm myself, I am getting hammered by others in the same
Given all that, I'm still having a hard time deciding that telling the offending machine to turn itself off isn't a valid, proportionate response to this sort of thing.
OK, OK, I'm not going to do it, but man . . .
Re:I'm sorely tempted . . . (Score:2)
The best thing you could do for that machine is shut it down. Its defenses have been COMPLETELY compromised. Without any defenses, the machine is useless.
Besides, only a total idiot would run mission critical software on an unpatched IIS server, particularly after the past few weeks.
Re:I'm sorely tempted . . . (Score:2, Insightful)
The fire extinguisher in this case is ipconfig /release, I think. Bonus marks for picking the right interface on a machine with more than one NIC.
How to get a list of all infected hosts (Score:2, Interesting)
OR, one group could patch all those infected hosts...or at least notify the admins.
I've got a full analysis of this at http://braddock.com/cr2.html [braddock.com]
In other news... (Score:2, Funny)
Your Mission, Should you Decide to Accept it... (Score:2)
Extra credit: Disinfect the machine with the security patch from the MS Web Site.
As this would be completely passive (Rather than patching the code red code) it should be slightly less dangerous than releasing a new worm to the net. And since it would affect only machines that have already been compromised, it should be slightly less ethically questionable than patching the worm code to do something new and the releasing it. I'm sure I'll get flamed for suggesting it nonetheless...
Aural Feedback (Score:3, Interesting)
#!/usr/bin/perl
while(1) {
system("cat
$returnval = system("diff attacks_a attacks_b >
if(0!=$returnval) {
system("cp -f attacks_b attacks_a");
system("play buzzer2.aiff &");
}
sleep(1);
}
A Warning to Whitehats (Score:5, Informative)
From the article:
The FBI has dismissed using any hack-back tactic as well. "It is not something that we could consider," said spokeswoman Debbie Weierman. "It would basically be viewed as an unauthorized intrusion."
It's not clear from the article whether such an 'unauthorized intrusion' by a private citizen would be illegal, but it might be worth thinking about before you go riding out to do battle with the Red Worm.
Let me get this straight (Score:2)
I grep \?XXX from
grep \?XXX
Then, for each result, I can telnet to port 80 and remote root the machine with a single get request for scripts/cmd.exe ??
I have 45 such hits in my log files, mostly from machines at my ISP. That is truly ridiculous.
Now that I've got access to hundreds of boxes (Score:2)
Here's where I got:
Suggestions? (Non-destructive, please, the goal is to alert not hurt)Re:Now that I've got access to hundreds of boxes (Score:2)
===
The page cannot be displayed
There are too many people accessing the Web site at this time.
---
Please try the following:
Click the Refresh button, or try again later.
Open the 65.29.102.77 home page, and then look for links to the information you want.
HTTP 403.9 - Access Forbidden: Too many users are connected
Internet Information Services
---
Technical Information (for support personnel)
Background:
This error can occur if the Web server is busy and cannot process your request due to heavy traffic.
More information:
Microsoft Support
Now I can try and /. myself :-) (Score:2)
You can find the results and a link to the script here [homeip.net]
New Sites report on CR2 (Score:4, Informative)
MSNBC [msnbc.com] has a longer story [msnbc.com].
Fox News [foxnews.com] has a few words [foxnews.com] to say.
ABC [go.com] copied [go.com] the AP story.
CBS [cbsnews.com] still seems to think the red tide is receeding [cbsnews.com].
Meanwhile the worm has knocked on my computer's door six times since I started this post. Uh, make that seven.
How to send a message to the poor bastards (Score:4, Informative)
http://ipaddress/c/inetpub/scripts/root.exe?/c+
%25COMPUTERNAME%25 translates to %COMPUTERNAME%, which returns the Windows hostname. I know that works from one of my failed attempts that gave me a reply, but with the above string, I get back a page with "Error in CGI Application" as
the title:
CGI Error
The specified CGI application misbehaved by not returning a complete set
of HTTP headers. The headers it did return are:
and it doesn't give me any return. Can anyone verify and/or debug this? It *might* be working.
The %USERDOMAIN% variable might be useful too, so you could send to the whole Windows domain, "Machine LUSER on DOOFUSDOMAIN is infected with Code Red II" or some such. %USERDOMAIN% is the machine name on systems on a workgroup.
Re:this sucks (Score:2)
You need to put down the Gibson crack pipe and start speaking in real-world terms. Square pegs? Ace of spades? Random hallucinatory metaphors do not a persuasive argument make.
Do you have an example of how malformed packets could be used to "take over" something? They're occasionally effective tools for DOS (though less and less as IP protocol handler authors stop making silly assumptions), and I do recall one FreeBSD ipfw vulnerability that hinged on the ability to set a certain flag in the packet header, but basically this is not such a big issue. All the fun and power is at higher levels - in the application layer.
Re:The Whitehouse.gov lesson (Score:2)
Re:Someone needs to write (Score:2, Funny)
Re:Someone needs to write (Score:2, Interesting)
The problem with fixing IIS servers automatically (Score:2)
Because those who are most vulnerable to the wormvirus are the companies with the most clueless sysadmins, the set of machines with uninstalled service packs (and running Index Server by out-of-the-box default, the vulnerable component) probably largely overlaps the set of Code Red machines.
Yes, having to administer one of these along with Solaris and Linux boxen, I've patched mine; trivial).
White Hat Viruses? (Score:2)
It would be illegal of course, but, well, Robin Hood broke the law too.
(I'm not advocating this of course, just thinking it's curious no such organization exists)
W
Re:Someone needs to write (Score:2)
GET
tried that. Unfortunately, you need cygwin wget. Is there an explorer.exe equivalent to wget?
Re:Repository of infected IP addressen (Score:2)
Re:Yup, sircam is more annoying (Score:2)
Re:Yup, sircam is more annoying (Score:2)
That's pretty damned amazing. To think that weather can be determined by a simple yes or no question.
SirCam procmail recipe (Score:2, Informative)
* > 100000
* mDmcOaA5pDmoOaw5sDnAOeA56DnsOfA59Dn4Ofw5ADoEOgg6H
/dev/null
Re:It is the time (Score:2)
Well, I haven't seen that yet, but I saw something even funnier:
999.999.999.999 - - [04/Aug/2001:23:43:18 -0400] "GET /default.ida?XXXXXXXXXXXXXXXXXJust_Kidding___Now_H ow_About_Running_Apache_Instead_of_IIS HTTP/1.0" 404 282 "-" "-"
(Yes, just some guy with a sense of humor and a web browser, not enough Xs to trigger the overflow ;-)
Re:Wasted bandwidth (Score:2)
Re:Wasted bandwidth (Score:2)
Microsoft's EULA prohibits me from suing them for bandwith charges for the stuff their crap throws at my Linux/Apache setup?
Wow, they must have better lawyers than I thought.
Re:Wasted bandwidth (Score:2)
MS has absolutely no liability(legally) in this particular instance. Personally, I think it's gross negligence on their part, and I think some *severe* measures are in order.
Quite frankly, I don't give a shit that they're a monopoly. My local telephone monopoly is *wonderful*. Very nice, very courtesous. As a business owner and a consumer, I'm very happy with them. But Microsoft is just plain mean and negligent.
Dave
Re:Wasted bandwidth (Score:2)
I do think that MS deserves some blame because they have made it insanely easy to administrate an NT box functionally by insanely hard to do so competently. The OS is user friendly but very obfuscatory (note that even apple never marketed Macintosh as a server, at least not until OS X-- they sold servers running Apple UNIX). How many questions on the MCSE exams covered planning for disaster recovery or planning for internet security (hint: less than one)? Those of us who prefer UNIX do so because it is easier to administrate properly though it requires more knowledge to do basic tasks... The learning curve is constant and does not get as steep as NT's does...
Microsoft also has a history of poor security programming. For example, the Microsoft implemtation of PPTP uses the users a hash of network password for the encryption key for the session. This does not necessarily make it easy to break into an account, but it does effectively prevent any forward security because your key will not change until your password does... I would not trust them with any critical information or production servers, and that includes IIS.
Not that it matters really-- of FreeBSD and Linux can gain enough dominance, they can effectively take the money out of the small server OS (fewer than 4 processors) and that would be a major blow to Microsoft and it would prevent them from being able to make billions off that industry...
A prediction (Score:2)
It's not if as many /.ers need to be told about the existence of the DEL command, and the intellectual leap required to recognize that the ability to execute an arbitrary command implies the ability to execute a particular command seems rather modest to me.
But before we mod this down as an insult to the intelligence of the /. readership, there is a more interesting issue: This particular inspiration is going to occur to a fair number of vandals, kiddies, and assorted undersocialized individuls. Many of them will do something more destructive with it than posting it to slashdot. More generally, the level of sophistication needed to attack a CRII-compromised machine is low, much lower than even script-kiddie level, low enough that any moderately determined wolfcub with a bent hairpin and a telnet client can do tremendous damage.
Thus, CRII has suddenly created and widely advertised a pool of very vulnerable machines. It would not be surprising to find that the worst damage is done by vandals following along behind CRII, just as looters follow behind natural disasters.
Ummm, no actuall (Score:4, Funny)
Sorry, I'm "in a mood" today and I couldn't help myself.
Still, it's interesting. If you put the frog in cold water and slowly turn up the heat what it will do, being cold blooded, is go to sleep long before it dies and *poaches.*
What is the relevance and why should anyone care? Lobster.
The correct way to cook a lobster, not matter what *anyone* tells you, is to put it in cold water and bring the heat up. The lobster relaxes and goes to sleep before it cooks.
If you just dump it in hot water it goes " Eeeeeeeeeeee," tightens up all of its muscles and pumps lactic acid throughout its system before it dies.
Starting in cold water is both more humane and results in quite noticably tastier lobster.
KFG
List of CodeRed IPs here (Score:3, Informative)
Last week: 92
Last 32 hours: 196 (175 unique addresses)
Looks like it's concrete bunker time soon... )-: