> I think the patch isn't enough if you have command shells lying around
> in places where they can be reached via a URL into your document root.

Since I used IIS for local ASP testing only, I have simply de-installed it
for now.

> I'm not sure how you find them all.    They won't always be called
cmd.exe - CodeRed left something called root.exe (I think).

I checked all cmd.exes around, they are all the same. I scanned _all_ exes
trying to find any simular to cmd.exe (by matching some of its internals).
Nothing simular. All I have original cmd.exes. No root.exes around.

If _it_ is there then where is it ?

Could it be so that outside NIMDA was trying to get a bad admin.dll down to
me by somehow running my cmd.exe/tftp.exe, but never succeeded ?
How did it do it ?
Why did not it succeed ?

What is the purpose of this request logged by my IIS ?
02:25:11 203.173.177.17 GET /scripts/..%2f../Admin.dll 500

I got this entry all over my IIS log files for last 2 weeks.
Is this to check if infected admin.dll finaly got to my PC ?

Regards
Alex




---------------------------------------------------------------------------
  New Zealand Delphi Users group - Offtopic List - [EMAIL PROTECTED]
                  Website: http://www.delphi.org.nz
To UnSub, send email to: [EMAIL PROTECTED] 
with body of "unsubscribe offtopic"
Web Archive at: http://www.mail-archive.com/offtopic%40delphi.org.nz/

Reply via email to