|The second part of 'Why it's good that RavenBlack is not a naughty hax0r' is to do with worms. All the common worms of today rely on a particular remote-vulnerability in the target machine. While this is an effective way to spread rapidly, it's less than effective against halfway-secure machines. I dub my theoretical worm 'The Brain Worm'. What the Brain Worm would do is behave rather like a manual hacker. It would infect machines with the invisible tricksy kernel rootkit, and sit quietly monitoring the various logged information. A short time after hearing things that sound like passwords, it would proceed to attempt to log into the source or destination machine related to that password, using the same username as it was associated with. It would then also have a few guesses at a root password (being the same, perhaps) before deploying all the common
local exploits. After a week or so of this near-dormant activity, The Brain Worm would go on a rampage of randomly seeking out the common remote-vulnerabilities, on the assumption that it's probably already collected all the passwords it's going to, by that point. Such a worm would have already taken ravenblack.net twice, like the live hax0rs did. Though never again.