Description: Internet Worms Basics Part-2 of the presentation talks about the exploitation phase in the propagation cycle of the worm. This phase generally consists of exploiting a well known flaw in services running on the victim computer which the user must have forgotten to patch. This phase is followed by replicating a copy of itself on the victim computer. The Blaster worm used the tftp protocol to transport a copy of itself from the infecting to the newly infected machine. The final phase is to run the newly created instance on the victim machine and scan for more vulnerable victims. It is important to note here that there are many other possible infection vectors. The one mentioned in this presentation is the simplest and most common type of propagation mechanism. Links:<br><br>1. Internet and Computer Worms<br><br>2. Analysis of the Blaster worm<br><br>3. Morris Internet Worm (First Internet Worm)<br><br>
Tags: basics ,
Latest from the SecurityTube Blog:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.