Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Agobot
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Spreading== The following propagation methods are sub-modules to the port scanning engine: * [https://web.archive.org/web/20050225010955/http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx MS03-026] [[Remote procedure call|RPC]] [[Distributed Component Object Model|DCOM]] Remote Buffer Overflow (CVE-2003-0352) * [http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx MS04-011] [[Local Security Authority Subsystem Service|LSASS]] Remote Buffer Overflow (CVE-2003-0533) * [http://www.microsoft.com/technet/security/bulletin/MS05-039.mspx MS05-039] [[Plug and Play]] Remote Buffer Overflow (CVE-2005-1983) * Attempts to hijack common [[Trojan horse (computing)|Trojan horses]] that accept incoming connections via an open port. * The ability to spread to systems by brute forcing a login. A good example is Telnet or Microsoft's [[Server Message Block]] Generally, it has been observed that every custom modified variant of Agobot features a selection of the above methods as well as some "homebrew" modules, which essentially are released exploits ported to its code. Names and such can be added via the XML files to produce variable shuffle imports.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)