Re: Infecting the KaZaA network?From: Alun Jones (firstname.lastname@example.org)
- Previous message: Frank Heyne: "RE: Long path exploit on NTFS"
- In reply to: GertJan de Leeuw: "Re: Infecting the KaZaA network?"
- Next in thread: Ben Laurie: "Re: Infecting the KaZaA network?"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
Date: Fri, 08 Feb 2002 13:58:52 -0600 To: GertJan de Leeuw <email@example.com> From: Alun Jones <firstname.lastname@example.org>
At 08:51 AM 2/8/2002, GertJan de Leeuw wrote:
>So the only way somebody can infect the network is ,
>injecting the first compiled version of a new
>distibution (but that is hardly impossible)
Not necessarily, one could simply find a portion of the original program
that is overspecified, or a feature that most people don't use, and write
your code into that space. If the code you replace is small enough, it'll
likely fit into a convenient block boundary, such that your code will
either be downloaded or not, and you really don't necessarily care about
infecting the whole network.
-- Texas Imperial Software | Try WFTPD, the Windows FTP Server. Find us at 1602 Harvest Moon Place | http://www.wftpd.com or email email@example.com Cedar Park TX 78613-1419 | VISA/MC accepted. NT-based sites, be sure to Fax/Voice +1(512)258-9858 | read details of WFTPD Pro for NT.