-yes, but its not TCP it's an SQL worm (eg, v. fast and no handshakes), it masquerades as a single harmless UDP packet but overruns the buffer (microsoft specs: "16 bytes ending in 00"), on past the 128 of memory reserved for SQL and into the next stack, dropping your little load (at the end) into memory! As it opens it thinks its a routine query. Pretty neat I thought, specially as most people don't even realise that they are running SQL (it's built into their Microsoft program) -ha -am I all right yet? R -thanks for the info Smiley --------------------------------- Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo.
CustName: JacobsFacilitiesInc Address: 2623 Camino Ramon City: San ramon StateProv: CA PostalCode: 94583 Country: US RegDate: 2002-12-16 Updated: 2002-12-16 -- )) (( c[_] bLiP www.justablip.co.uk
participants (2)
-
angry troll [OT] -
learn&Evolve