Jan 29, 2005

Found Poetry I


Execution Instructions for MySQL Database Worm

Download and execute files
List, stop, and start processes and threads
Launch SYN and UDP Denial of Service attacks
Search for files on the compromised computer
Log keystrokes to file
Access network shares and copy itself to those network shares
Scan the network for vulnerable hosts by means of port scanning
Open a command shell on the infected computer
Start a HTTP proxy server
Start a SOCKSv4 proxy server
Add and delete network shares and disable DCOM
Reboot the infected computer

-Anonymous, 2004-5

No comments: