02.11.2014 Views

untangling_the_web

untangling_the_web

untangling_the_web

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DOCID: 4046925<br />

UNCLASSIFIEDiiFOR OlililelAL USE ONLY<br />

4. open a DOS command tool and type netstat -a 15 or<br />

select Start I Run I netstat -a 15<br />

Netstat will display all <strong>the</strong> active and listening IP ports on your computer refreshing<br />

every 15 seconds. What you are looking for is suspicious port activity. For<br />

example, if port 31337 is active, <strong>the</strong>re is a good chance you have <strong>the</strong> Back Orifice<br />

Trojan on your computer. Also, look for unknown FTP server processes (port 21) or<br />

<strong>web</strong> servers (port 80) that show up using netstat. But remember, you must<br />

disconnect from <strong>the</strong> Internet and shut down all programs that might use <strong>the</strong> Internet<br />

to get an accurate reading.<br />

Or you can try a free online Trojan scanner such as <strong>the</strong> one available from<br />

PCFlank.com or WindowSecurity.com (below). While a negative report is no<br />

guarantee you do not have a Trojan horse, a positive test means you need to take<br />

action to remove this infection.<br />

What should you do if you think you have a Trojan on your computer? I strongly<br />

recommend that you not start deleting software indiscriminately because something<br />

you don't recognize may in fact be a piece of vital software! Instead, if something<br />

suspicious shows up in your netstat investigation, now is <strong>the</strong> time to get some good<br />

Trojan-detection and removal software. Below are some sites that will help you<br />

locate legitimate anti-Trojan software and provide o<strong>the</strong>r advice on how to prevent<br />

and remediate infection.<br />

What if you ultimately discover that your computer is infested with a Trojan? Even<br />

after you have successfully removed <strong>the</strong> malware, this may not be <strong>the</strong> end. How<br />

long was <strong>the</strong> Trojan on your system? What kind of information did it collect and<br />

forward? It is probably prudent (if inconvenient) to change all your passwords and<br />

even get new credit cards if you have used <strong>the</strong>m on that computer just to be on <strong>the</strong><br />

safe side. If you do such things as stock trading on your computer, you should<br />

probably assume your account has been compromised. In fact, assume everything<br />

on your computer has been compromised and treat <strong>the</strong> invasion as if a thief broke<br />

into your house and lived in it for months without your knowledge.<br />

As you can see, Trojan horses are bad, really bad. Again, it is best to avoid <strong>the</strong>m,<br />

and <strong>the</strong> single best defense is not to be promiscuous when it comes to downloading<br />

software and opening email attachments. The second best defense is a good<br />

firewall. But keep in mind that it is up to you to set <strong>the</strong> firewall options at a high level<br />

of protection to ensure that no Trojan can "phone home" without your permission.<br />

List of Trojan Ports<br />

Onctek's Trojan Port List<br />

Anti-Trojan Software Reviews<br />

Anti-Trojan.org<br />

Anti-Trojan Guide from Firewall Guide<br />

http://secured.orcon.net.nz/portlist list.html<br />

http://www.onctek.com/trojanports.html<br />

http://www.anti-trojan-software-reviews.com/<br />

http://www.anti-trojan.org/<br />

http://www.firewallguide.com/anti-trojan.htm<br />

590 UNCLASSIFIEDliliOft OlililelAL USE or~L,(

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!