From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=ham autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: 107f24,582dff0b3f065a52 X-Google-Attributes: gid107f24,public X-Google-Thread: 109fba,582dff0b3f065a52 X-Google-Attributes: gid109fba,public X-Google-Thread: 1014db,582dff0b3f065a52 X-Google-Attributes: gid1014db,public X-Google-Thread: 103376,bc1361a952ec75ca X-Google-Attributes: gid103376,public X-Google-ArrivalTime: 2001-08-25 15:41:02 PST Path: archiver1.google.com!newsfeed.google.com!newsfeed.stanford.edu!news.tele.dk!small.news.tele.dk!194.213.69.151!news.algonet.se!algonet!pepsi.tninet.se!not-for-mail From: Stefan Skoglund Newsgroups: comp.lang.ada,comp.lang.c,comp.lang.c++,comp.lang.functional Subject: Re: How Ada could have prevented the Red Code distributed denial of service attack. Date: Sun, 26 Aug 2001 00:44:39 +0200 Organization: Telenordia Message-ID: <3B882A57.1FAC8449@ebox.tninet.se> References: <3B6555ED.9B0B0420@sneakemail.com> <87n15lxzzv.fsf@deneb.enyo.de> <3B672322.B5EA1B66@home.com> <4a885870.0108112341.7ce02ac0@posting.google.com> <3B834E5D.B0D26AB1@adaworks.com> <9lvsic$bet9s$1@ID-9852.news.dfncis.de> <9m0193$grs$1@bird.wu-wien.ac.at> NNTP-Posting-Host: du131-243.ppp.algonet.se Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Trace: cubacola.tninet.se 998779220 27216 195.100.243.131 (25 Aug 2001 22:40:20 GMT) X-Complaints-To: abuse@algo.net NNTP-Posting-Date: 25 Aug 2001 22:40:20 GMT X-Mailer: Mozilla 4.72 [en] (Win95; I) X-Accept-Language: sv,en,en-US Xref: archiver1.google.com comp.lang.ada:12421 comp.lang.c:76900 comp.lang.c++:85676 comp.lang.functional:7682 Date: 2001-08-25T22:40:20+00:00 List-Id: Ted Dennison wrote: > Well, I should point out that this isn't really "weapons technology". Its just > the engine control systems. The weapons are controlled by completely different > systems. Hrrmm, i got a idea for a good ECM system some days ago. Look for exploitable overflow bugs in some communication system. Put a transmitter in a missile there the transmitter is able to send its rootkit and have the kit penetrate the enemy's CIWS system... (well it is hack of the 4tf July movie) Would it be possible to insert such a thing into a jtids system ?