REXECRemote Execution
REXECRemote Execution Command
Copyright 1988-2018, All rights reserved.
References in periodicals archive ?
The worm would first attempt to create a remote shell using the rexec service.
The worm would do a rexec to the current host (using the local user name and password) and would try a rsh command to the remote host using the username taken from the file.
Later it was seen trying rsh and rexec into one of the gateways.