Jump to content

Search the Community

Showing results for tags 'worm'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • New USB Rubber Ducky
    • WiFi Pineapple
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
    • WiFi Coconut
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Legacy Devices
    • Classic USB Rubber Ducky
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 3 results

  1. Hello, I am in master in system and computer security I would like you expose my problem to know if you could help me. I explain to you we have a project to create a worm that encrypts file type ". Avi "who will infect the victim's pc (the defender) and then spread to his virtual machine that is connected to the same local network and they will have to create a secure system. Here is what we have: - We have 2 choices of infection be using the local network "the pc of the victim and my machine using a network cable" or otherwise via a USB key that we just insert it yes remove ( I thought of Rubber Ducky or create one but I can not find it in my country) - the operating system Windows XP sp3 32 bit. - they have the right to use all possible tools including anti virus. - the port they will have to leave open is 443 80 135. My problem lies in how to infect the machine and subsequently spread my worm. It's been 2 weeks that I'm looking for but I still have no satisfactory answer. I tested the last flaw of EthernelBlue but without success Kaspersky blocks my access Thank you.
  2. https://www.wired.com/2003/07/slammer/ I know Slammer is a few years back now, and some of you are probably already aware of it, but can we all just take a moment to appreciate how beautiful it really was? About half way down the page above is Slammer's simple code (starting at 'step one'). Slammer; Fit inside 1 UDP package at less than 376 bytes. DoS'd about 75,000 SQL Servers and affected millions of machines in less than 15 minutes. Chose victims at random, at hundreds of IP attempts per second per machine, so no one was safe. I don't think they ever even found out who did it? (citation needed) I think I need some time alone with a box of tissues.
  3. In short. There is a worm going arround that can infect Linksys routers ( new models ) More info: https://isc.sans.edu/forums/diary/Linksys+Worm+TheMoon+Captured/17630
×
×
  • Create New...