On Saturday 25 August 2007 00:43, Jude DaShiell wrote:
> Very easily. The very first thing the trojan did after installing itself
> was to call home. Home has the address of the trojaned machine. Home can
> then check up on its trojan and maintain it and activate it or repair it
> as necessary.
Note: top posting fixed. Please don't do that. Also overquoting trimmed.
On Sat, Aug 25, 2007 at 02:43:41AM -0500, Jude DaShiell wrote:
> On Fri, 24 Aug 2007, Mike Bird wrote:
>
> >On Friday 24 August 2007 17:59, Jude DaShiell wrote:
> >>how these trojans survive is by surviving operating syst
Very easily. The very first thing the trojan did after installing itself
was to call home. Home has the address of the trojaned machine. Home can
then check up on its trojan and maintain it and activate it or repair it
as necessary.
On Fri, 24 Aug 2007, Mike Bird wrote:
On Friday 24 Aug
On Friday 24 August 2007 17:59, Jude DaShiell wrote:
> how these trojans survive is by surviving operating system reinstalls.
> The better trojans hide themselves in several out of the way places on
> disks and after adjacent areas have got their new files copy themselves
> back into the areas wher
> how these trojans survive is by surviving operating system
> reinstalls. The better trojans hide themselves in several out of the way
> places on disks and after adjacent areas have got their new files copy
> themselves back into the areas where no more disk wiping by the installer
> is about to
how these trojans survive is by surviving operating system reinstalls.
The better trojans hide themselves in several out of the way places on
disks and after adjacent areas have got their new files copy themselves
back into the areas where no more disk wiping by the installer is about to
happen
On Fri, Aug 24, 2007 at 05:01:21PM -0700, Mike Bird wrote:
> Why do you believe a security erasure is needed rather than simply
> starting with a fresh block zero? If infected, the OP can use a
> Debian Installation CD and make new partition tables.
>
Good question. I've yet to hear a definit
On Friday 24 August 2007 16:16, Jude DaShiell wrote:
> Those trojans trash very many files whenever anyone tries surgery on them.
> That was found out in a security lab by security professionals. If you
> can get to a friends computer and download the dban iso file from
> http://dban.sf.net and bu
Those trojans trash very many files whenever anyone tries surgery on them.
That was found out in a security lab by security professionals. If you
can get to a friends computer and download the dban iso file from
http://dban.sf.net and burn that on a single session CD and boot it up on
the infe
On Fri, Aug 24, 2007 at 11:24:35AM -0400, John wrote:
> Today's run of chkrootkit produced the following ominous message:
[elided]
> Am I right in thinking the only thing to do is wipe the machine down
> to bare metal and reinstall? I'm not sufficiently knowledgeable to do
> much forensic checki
10 matches
Mail list logo