This is typically accomplished by scanning broad IP address ranges with port scanners in search of servers running open ports that are vulnerable to attack by various scripts (e.g. CGI, PHP, VNC, etc.). The scripts are utilized to gain entry into the server whereupon the cracker uploads server software and creates logins. Many crackers will then patch the server against the very vulnerabilities they utilized to compromise the system thereby protecting it from being hijacked by other FXP groups.
- Braithwaite, Richard, "The ‘pubstro’ phenomenon: Robin Hoods of the Internet" (2003). ACIS 2003 Proceedings. 104.
- Jelver, P.: Pubstro-hacking – Systematic Establishment of Warez Servers on Windows Internet Servers, Verified: July 24 (2003), July 23 (2002)
- Stefan, Axelsson (2003). "Visualisation for Intrusion Detection - Hooking the Worm". In The proceedings of the 8th European Symposium on Research in Computer Security (ESORICS 2003), volume 2808 of LNCS. Springer Verlag.
- Pubstro and pubbing explanations on aboutthescene.com.