home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!utcsri!dgp.toronto.edu!flaps
- Newsgroups: alt.security
- From: flaps@dgp.toronto.edu (Alan J Rosenthal)
- Subject: Re: internet worm.
- Message-ID: <1992Nov7.235800.17258@jarvis.csri.toronto.edu>
- Summary: lower-tech solution
- References: <3994@bcstec.ca.boeing.com> <1992Oct26.194054.26404@samba.oit.unc.edu> <1992Oct26.235108.1321@ulysses.att.com> <1992Oct27.025453.25789@random.ccs.northeastern.edu> <1992Oct27.104002.4583@donau.et.tudelft.nl> <1992Oct27.215446.15134@cirrus.com> <1992Oc <morten.720633654@oase>
- Date: 8 Nov 92 04:58:00 GMT
- Lines: 19
-
- morten@oase.kemi.aau.dk (Morten Kjeldgaard) writes:
- >So, along those lines, why not have a beneign, authorized and official WORM
- >on the internet, that tries every known way of penetrating the security
- >system. If the worm penetrates into a computer, the system manager is
- >notified and told how and where the security failed.
- >
- >This should be done in *agreement* with the parties involved, and the worm
- >should NOT be programmed to duplicate and spread wildly, of course, but
- >could be directed towards specific computers, via a list of hosts that have
- >joined the system.
-
- This facility already exists. To access it, ftp a copy of "cops" and run it on
- your system. Various security holes will be reported.
-
- Of course, it would be COOLER if it actually tried to exploit these holes from
- a remote system, but no more useful. In fact, it would be less useful, because
- cops also tells you about holes that people could exploit once they were
- already in, even if it doesn't find any hole which it knows will assist people
- in breaking in per se.
-