#Xp embedded conficker password#
(Added April 2nd, 2009: you can see a nice graphic of this password list at Graham Cluley’s blog). So weak passwords are still letting us down. Given that the worm has successfully infected such a large number of machines, this password guessing stragegy must be quite effective. The list of just over 180 passwords candidates contains the usual suspects – the username for the account, repeated digits, qwerty, admin, password and pass1, pass12, pass123. The question remains, now that they have the world’s most powerful supercomputer system at their disposal, what are they going to do with it?Īnd I wonder what the LINPACK rating for Storm is?Īnd I wonder what the LINPACK rating is for Conficker?į-secure has a write-up on the worm which includes the list of passwords that it checks (reproduced below). This may be the first time that a top 10 supercomputer has been controlled not by a government or megacorporation but by criminals. In fact this composite system has better hardware resources than what’s listed at. Using the figures from Valve’s online surveyįor which the typical machine has a 2.3 – 3.3 GHz single core CPU with about 1GB of RAM, the Storm cluster has the equivalent of 1-10M (approximately) 2.8 GHz P4s with 1-10 petabytes of RAM (BlueGene/L has a paltry 32 terabytes). Comprising between 1 and 10 million CPUs (depending on whose estimates you believe), the Storm botnet easily outperforms the currently top-ranked system, BlueGene/L, with a mere 128K CPU cores.
This doesn’t seem to have received much attention, but the world’s most powerful supercomputer entered operation recently. This all reminds me of a mail post by Peter Gutmann from 2007 called, World’s most powerful supercomputer goes online, referring to the Storm botnet From there, the attack spilled across the globe. National Health Service hospitals (NHS) in the UK was hit hard, with its phone lines and IT systems being held hostage.
So from BartPE you can navigate here on the hard drive and import it into regedit, when importing the name doesn't matter (I usually just mashed the keyboard), then after changes are made you can export it back. In there you will see DEFAULT, SAM, SECURITY, SOFTWARE, and SYSTEM. Choose your specialty (DDoS, Spam, Data Exfiltration)Īnd further the vendor has good qualifications Registry hives on an XP machine can normally be found at C:\WINDOWS\system32\config.