The logic behind the WannaCry "Kill Switch" - Was it genius or just luck?
I've been revisiting the 2017 WannaCry incident recently for a project, specifically f 2025-11-24 19:30:21 Author: www.reddit.com(查看原文) 阅读量:2 收藏

I've been revisiting the 2017 WannaCry incident recently for a project, specifically focusing on the moment Marcus Hutchins registered the sinkhole domain.

It's fascinating that the code actually checked for the domain's existence to *stop* itself (sandbox evasion technique), which inadvertently became its undoing. It's crazy to think a $100B damage run was halted by a $10 domain registration that was done partly out of curiosity.

I made a visual breakdown/documentary attempting to reconstruct this timeline and the specific mechanics of the exploit.

If anyone is interested in the visual reconstruction of the attack map and the kill switch logic, here is the video: [BURAYA YOUTUBE LİNKİ]

Curious to hear if you think we are better prepared today for something like EternalBlue?


文章来源: https://www.reddit.com/r/netsecstudents/comments/1p5qmak/the_logic_behind_the_wannacry_kill_switch_was_it/
如有侵权请联系:admin#unsafe.sh