What is the Blaster worm?
Blaster Worm was a computer program of Malware, which was first spread over the Internet in 2003. Within a few days of its appearance in early August 2003, a worm of several hundred thousand Windows -based computers infected. Blaster Worm was not an attack on zero day because it took advantage of a safety hole that was actually repaired in July of the same year. Computers that already had a patch were not vulnerable, and those that could successfully download it were then protected from further exploitation. One of the functions that Blaster Worm performed was to use infected computers in a number of distributed attacks to denying the service (DDOS) on servers responsible for providing security patches. The groups of hackers were able to turn the patch to discover and then take advantage of the vulnerability that had a marker. They designed a worm using a file called MSBLAST.EXE, where the name Blaster comes from. Once the computer has been infected, the worm would contact a large number of internet protocol address (IP) per port 135. If it wasThis is contacted by the vulnerable Windows XP® machine, the worm could repeat, and then repeat the process.
One of the consequences of Blaster Worm infection was to participate in the timed DDOS attack. Each infected computer has been set so that the servers responsible for distributing patch directs a large amount of traffic. These attacks depended on the local lessons of the infected computer, which led to a continuous wave of excessive operation focused on servers. This strategy has caused any changes in the way these updates of you work so that the critical patches remain available to future attacks.
As soon as the nature of the infection has been discovered, many Internet service providers (ISP) began to block traffic on the port 135. This effectively stopped the distribution of worm across these Internet ISPs, although a large number of machines have already been infected. As cleaning operations began, the rows began to appearAnd variants. Of these variants, one used the same exploitation to attempt a forced stain of the problem. This was referred to as a useful worm, despite the fact that it has resulted in a number of its own problems.