Name
Win32/Blaster/Worm (Lovsan, Lovesan)
Type
Spreader, Worm
Author
Unknown
Written in
C
Description
This worm was very active in 2003. It spreaded via an RPC vulnerability and executed a DoS attack on a specific date. It’s a well structured code, easy to read and understand. The intresting paragraphs are the spreader which attacks new victim system to learn and see how (easily) it is done and the usage of raw sockets in the payload which is in charge of the SYN flood attack.
Questions
Do you have a question about this RAT/bot/worm? At the bottom of this post you find the box where you can type and send your message.
Downloads
BAIXE AKI
Information
Wikipedia