Location:
Search - scan worm
Search list
Description: used to simulate CodeRed v2 worm,result as scan traffic!-used to simulate Code v2 worm, the result as scan traffic!
Platform: |
Size: 5119 |
Author: 周晓明 |
Hits:
Description: used to simulate CodeRed v2 worm,result as scan traffic!-used to simulate Code v2 worm, the result as scan traffic!
Platform: |
Size: 5120 |
Author: 周晓明 |
Hits:
Description: 本程序主要实现FTP的爬虫系统,对FTP上文件进行扫描,并建立自有数据库系统。以提供给FTP搜索引擎查询。-The main achievement of FTP program reptiles system, scan files on the FTP, and to establish its own database system. To provide a FTP search engine queries.
Platform: |
Size: 231424 |
Author: nano |
Hits:
Description: 根据集团公司“交换防瘫痪、传输防阻断、数据防拥塞”的要求,IP 城域网在运行过
程中就需要经常注意节点出口带宽的使用情况,由于今年来,计算机的普及,上网人数呈现
几何级的增长,互联网病毒也越来越多,爆发的频率也越来越高,许多蠕虫病毒在爆发时具
有扫描网络,主动传播病毒的能力,会大量占用网络带宽或网络设备系统资源。在很短的时
间内,大量的异常流量会淹没正常的流量,非正常的数据流量攻击网络设备或其接入的服务
器,致使网络设备或服务器的性能下降,或占用网络带宽,影响其它相关用户流量的正常通
信,最终使被攻击目标因过载而崩溃-According to the company, "anti-paralysis of the exchange, transfer anti-blocking, anti-congestion data" requirements, IP MAN run over
Process requires constant attention to the export node bandwidth usage, because this year, the popularity of computers, the Internet showing the number of
Geometric growth of the Internet more and more viruses, increasing the frequency of outbreaks, many of the outbreak of a worm
There scan the network, the ability to take the initiative to spread the virus will take a lot of network bandwidth or network equipment system resources. In a very short time
Room, a large number of abnormal traffic flow will take away the normal, non-normal data traffic attacks or access the services network equipment
Device, resulting in the performance of network devices or server down, or network bandwidth, affecting the normal flow of other relevant users through
Letter, and finally to be targeted collapse due to overload
Platform: |
Size: 90112 |
Author: li |
Hits:
Description: 一个利用该漏洞的蠕虫程序。跟LION蠕虫有些相象,都需要把自己寄存到某个FTP主机上、、、、、、
运行:直接运行(无参数)将扫描本机IP开始的100个主机,并修改首页、传播
带参数运行 :iis 202.97.233.0 202.97.233.254 这将扫描该IP段的主机并实施攻击。-One advantage of the vulnerability of the worm. LION worm with some resemblance, you need to register themselves to a FTP host ,,,,,, run: run directly (without parameters) will scan the local host IP starting 100, and modify the page, spread with parameters Run: iis 202.97.233.0 202.97.233.254 This will scan the IP section of the host and the implementation of the attack.
Platform: |
Size: 4096 |
Author: 叶文谆 |
Hits:
Description: 最简单的方法是启用WIN2003的自身带的网络防火墙,并进行端口的改变。功能还可以!Internet 连接防火墙可以有效地拦截对Windows 2003服务器的非法入侵,防止非法远程主机对服务器的扫描,提高windows 2003服务器的安全性。同时,也可以有效拦截利用操作系统漏洞进行端口攻击的病毒,如冲击波等蠕虫病毒。如果在用windows 2003构造的虚拟路由器上启用此防火墙功能,能够对整个内部网络起到很好的保护作用。-The easiest way is to enable itself with WIN2003 network firewall and the port change. Function can also be! Internet Connection Firewall can effectively intercept the illegal invasion Windows 2003 Server, to prevent illegal remote host server scan, improve windows 2003 server security. Also, you can effectively block the port using the operating system vulnerabilities to attack viruses such as Blaster worm. If constructed with windows 2003 virtual firewall feature is enabled on the router, to the entire internal network play a very good protection.
Platform: |
Size: 16384 |
Author: 张旭川 |
Hits:
Description: 在本地开辟后门,监听TCP 5554端口,做为FTP服务器等待远程控制命令。病毒以FTP的形式提供文件传送。黑客可以通过这个端口偷窃用户机器的文件和其他信息。 病毒开辟128个扫描线程。以本地IP地址为基础,取随机IP地址,疯狂的试探连接445端口,试图利用Windows目录下的Lsass.exe中存在一个缓冲区溢出漏洞进行攻击,一旦攻击成功会导致对方机器感染此病毒并进行下一轮的传播,攻击失败也会造成对方机器的缓冲区溢出,导致对方机器程序非法操作,以及系统异常等。-Open the back door in the local, monitor TCP port 5554, as a FTP server for the remote control command. Virus provides file transfer in the form of FTP. Hackers can steal user machine through the port of documents and other information. Virus scan thread open 128. To the local IP address as the foundation, take a random IP address, crazy test connection port 445, try to use the Windows directory under the Lsass.exe in the presence of a buffer overflow attack, once the attack success will lead to other machines infected with the virus and spread the next round of attacks failed, also will cause the other machine buffer buffer overflow, led to the other machine program of illegal operations, as well as the system abnormality.
Platform: |
Size: 2048 |
Author: 张得帅 |
Hits: