[78766] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IBM to offer service to bounce unwanted e-mail back to the

daemon@ATHENA.MIT.EDU (Colin Johnston)
Tue Mar 22 14:23:35 2005

Date: Tue, 22 Mar 2005 19:22:48 +0000
From: Colin Johnston <colinj@mx5.org.uk>
To: Florian Weimer <fw@deneb.enyo.de>,
	Andreas Ott <andreas@naund.org>
Cc: <nanog@merit.edu>
In-Reply-To: <87sm2nbj7j.fsf@deneb.enyo.de>
Errors-To: owner-nanog@merit.edu


The better idea would be fingerprint the spam to match the bot used to match
the exploit used to run the bot to then reverse exploit back to the
exploited machine patching in the process.
I managed to setup such a system a while ago with nimda traffic however I
could not a find a software tool which exploited a nimda exploited machine
which could then patch it and remove the virus
(Ie a remote doctor without you knowing :)

Colin Johnston


home help back first fref pref prev next nref lref last post