Deploying DDOS
Attackers seem to use standard, well-known holes (i.e., rpc.ttdbserver, amd, rpc.cmsd, rpc.mountd, rpc.statd, etc.).
They appear to have “auto-hack” tools – point, click, and invade.
- Optional step: erase the log files; hide program.
Lesson: practice good computer hygiene.