greenist wrote:Hi limdis
The reason ive chosen Conficker after the research done by my self and other members help we had here i have identified a port for this TEST the reason ive chose Conficker Worm correct me if im wrong it was the most advice type of worm developed by Chinese man first reported in 2008 and a very advanced worm. most systems renaming unprotected to late 2009
Not sure if i right but should allow me to gain full access to the machine .
Were we plan to leave a message on the index.html
Conflick is a windows server 2003 worm the OS were TESTING is an unpatched version of WINSER2003 so this is an ideal worm if it works.
If im wrong please correct me the conflicker worm runs from a host computer and gain access to others once it gives access to remote computer it will allow access to the remote files to be viewed and edited.
Idea is to create an admin account don't need to hide anything can let my Tutor see ive been the then after i planing to disable any java script the sever maybe running as the only source on the index is html and java that should then allow to edit the index.html .
If that wont work next plan would be good to access installed programs check the software that installed on server
the tutor drop a hint in lesson the HDF is a piece of small software so checking installed programs to see if i can disable the the HDF
If not next plan was to access to running services and process to see if there any HDF running there see if i can disable it from there.
We Just need to Gain access and Edit the indexpage.html of the server BUT the HDF is guarding the file so we need to disable this first before the page can be edited.
Thanks Look forward to everyone help on this
There is no doubt that it would not infect the target machine, as I said before.
This machine is actually open to over 200 attacks from Armitage alone.
The thing is, it has a hard disk firewall that you need to look at getting around.
Your goal here would be to get around the firewall opposed to what you are using, that worm is one of the hundreds of possible attacks.
This machine is sitting there open ports and only running that hard disk firewall.
The firewall is very advanced, and blocks all attacks I have tried so far.
Find a way around it, then you are golden to any type of attack almost.
How do you plan on launching this attack against this machine may I ask?
With the hard disk firewall there, I believe the only option is nearly social engineering unless the machine is located in your LAN.