Sounds like a great idea, although I'd be the kind of BOFH that puts a format or
fdisk command into the script. It's their fault for not securing their system
and then trying to infect me, after all ;)

On Sat, 22 Sep 2001 14:05:40 +0800, "Franki" <[EMAIL PROTECTED]> wrote:
> Hi,
> 
> Here is what I have done...
> 
> I created a file in /sbin called aptly enough, nimda
> 
> make the file executable and put the code at the bottom of this mail in it..
> 
> then make a file called /var/tmp/blocked and make it writable...
> 
> make sure the path to your http error log directory is correct in the
> script..
> 
> and make a cron job to run this often, (I have been doing it every couple of
> minutes as it doesn't seem to chew alot of cpu or memory, even if it is
> parsing a 500mb error_log, (and I am doing it on my test server with a
> Ppro200 and 48mb of ram...)
> 
> it will create ipchains rules for each nasty nimda server and block them, it
> will also add their IP address to /var/tmp/blocked
> 
> you will need to change the rule alittle if you are using IPtables.. nothing
> too difficult though..
> 
> I am also using the hack that shuts down any server with root.exe on it..
> and that has made a substantial difference too..
> I only get scanned once by those servers because they shutdown immediately
> upon trying to infect my box.... works great..
> 
> I didn't want to do that.. but there are now 3500 IPaddress listed in my
> /var/tmp/blocked file, and ALL of them are infected and the amount goes up
> dramaticily each day, (altough it has backed off alot lately.)
> 
> I have some other scripts here that were donated to me, but I have yet to
> try them..
> 
> if you are using the stop iss server trick, you need to do what I did, check
> your httpd error log, (/var/log/httpd/error_log_ and see what directories
> the IIS servers are looking for,,, then create those directories and put the
> php script in there..
> 
> I have versions of it called Admin.dll, root.exe, default.ida and cmd.exe in
> each created directory structure...
> 
> all the php script does, is open linx to the url of the server and issue the
> shutdown code to root.exe on that box, (I figure any box that now has nimda
> previously had CoderedII and will still have root.exe, seems to be true
> too...
> 
> hope this helps..
> 
> I don't know of the legalities of the shutdown code, but I look at it this
> way,, I just put the file on my server, I am not infecteding anyone with it,
> if their servers request it, thats their problem, not mine,,
> 
> I could just as easily but a bat file up for download that said "format c:\"
> or something similiar on my server and if someone was dumb enough to
> download and run it, its not my problem because I didn't infect them, they
> downloaded it.
> 
> same diff with the stop server php script, it is on my server alone, I don't
> promote it, if a infected server comes to mine and grabs it,, that is not my
> problem,, I held of doing this for ages in the hope that it will stop, but I
> am now going to get a huge ISP bill for my permanent connection and what do
> I do,?? charge it to the infected servers????
> 
> They wouldn't pay even if I could get them all,,, ,(most of the pages on
> those servers are default NT/2000 iis pages, meaning that the people don't
> even know they are running a web server...)
> 
> if shutting down their server, (rather then hacking and damageing it, or
> leaving it up so that others can.) does not get their attention and get them
> patched,,, then nothing does.. I view this as doing them a favour as if
> there server gets shutdown, then other nasty types can't use the root.exe to
> install back doors and such.
> 
> does anyone else have an opinion on this??
> 
> rgds
> 
> Frank
> 
> 
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Mark Johnson
> Sent: Friday, 21 September 2001 9:57 PM
> To: LinuxNewbie (E-mail)
> Subject: [newbie] These windows viruses(sp?) pain for linux users too...
> 
> 
> 
> You know how these Code Red and Code Blue and Nimbda virus's are affecting
> me as a linux user -- they are eating my bandwidth and trashing my weblogs.
> I can't play UT tournament anymore because it's killing my response time and
> connecting to the newserver and reading news has become painfully slow.
> 
> If I open up port 80 on my firewall my weblogs are flooded with these
> viruses.  A lot of the ip addresses are coming from my ISPs subnet.  Is
> there anyway that I can let my ISP know about this and have then contact the
> people infected by these viruses to let me know.  I would imagine that they
> already know about it.  How can we get this stuff cleaned up?
> 
> 
> Will this insanity ever end?
> 
> 
> 
> 



-- 
Sridhar Dhanapalan.
        "There are two major products that come from Berkeley:
        LSD and UNIX. We don't believe this to be a coincidence."
                -- Jeremy S. Anderson

Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to