摘要 |
PURPOSE: A secure worm is provided to recover a damaged system, due to hacking, and to control worm properties actively. CONSTITUTION: A secure worm finds out a vulnerable point of a system using "-bash". The secure worm launches a remote attack with an inetcop file to infiltrate into the system and carries out self-replication. After the infiltration, the secure worm downloads various patch files using the first file. By executing the second file, the secure worm patches all the daemons having a vulnerable point. An info.0 file carries the environment setup and other setup of the system by mail. As the self-replicated files are executed again, all the steps are repeated.
|