427 Botnet fm qxd


www.syngress.com/solutions



Download 6,98 Mb.
Pdf ko'rish
bet69/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   65   66   67   68   69   70   71   72   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com/solutions
and click on the 
“Ask the Author”
form. 
427_Botnet_02.qxd 1/9/07 9:49 AM Page 73



At times your computer may run significantly slower than normal.
Unfortunately this is commonly due to AV software searching for
various forms of malware, including botnet clients.

The network activity light on your DSL modem or NIC card may
flash rapidly during a time when you aren’t doing anything that you
believe would cause network traffic.

Your antivirus program may shut off by itself.

If it’s still running, your antivirus program may detect several types of
malicious code at one time.The names given to the viruses may indi-
cate parts of a botclient’s functionality like hide windows, backdoor,
and so on.

Your Windows XP firewall log, which may be called pfirewall.log if a
domain policy hasn’t picked another standard, is located in the
Windows or WINNT directory. Examine any Inbound Open source
IP addresses and destination ports for a rational explanation. If you
have access to lists of Command and Control servers, any traffic to a
known C&C server should be considered a big clue.

Run TCPView from www.systeminternals.com. Examine all of the
network connections and the processes that are associated with them.
Any unknown processes or unfamiliar connection IP addresses should
be investigated.

Run Process Explorer from www.systeminternals.com. Examine the
processes to see if any processes are running that don’t normally run
on your computer. Right-click to be able to select Verify. If the
vendor is unable to verify the process, you can click on Google on
the same menu. Using Google you can see if anyone else has
reported bad things about the process. One problem with this
approach is that hackers may replace known good executables with
malware and reuse the good software’s name.

Check the security event log for login failure for network type 3
where the workstation name does not match the local computer
name.This would be a sign of a password guessing attack, particularly

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   65   66   67   68   69   70   71   72   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish