Trojans.
If port 139 is excluded, You can further analyze the port by entering the browser to see what kind of reflection it will make. You can judge it based on the situation.
The hacker can see what ports are open on the computer. In addition to port 139, there are other ports open. You can analyze them. If you decide that a trojan is in your computer, you have to ---- Delete the Trojan on the hard disk
The simplest method is to remove Trojans with the ghost software. The netvrvvirus wall can
to log on to the target server by using net use X. x. x. xipc $ "adminpwd"/User: "adminuser" (for details, see How To Get In NT in killusa)2 Use ntsrv.exe to start remote: netsvc x. x schedule/start3. Use at.exeto run the program on the remote server at a specified time. Of course, the fastest run is the most ideal. Therefore, you can use letmein.exe to get the server time, and then:At x. x 00:00 ntsrv.exe/port: 64321At, you need to change the specific time taken back by using letmein.exeto adj
see if there is a trojan on our computer.
First, check the startup projects in the system. ini, win. ini, and Startup Group. Start from "-> Run", enter msconfig, and run the "System Configuration Utility" that comes with Windows ".
1. view the system. ini file
Choose the "system.ini]" tab in the left-side Navigation Pane. The "bootstrapping" Directory will be displayed. The "Too shell‑policer.exe" line will be displayed"If this is not the case, the trojan may be in progress. As shown in the fol
same host, you will receive many alarms when you configure IDS properly.Intrusion monitoringMost IDS programs provide a very detailed analysis of network traffic. They can monitor any defined traffic. Most programs have default settings for FTP, HTTP, and Telnet traffic, and other traffic such as NetBus, local and remote logon failures, etc. You can also customize your own policies. The following describes some more common detection techniques.Networ
be malware, or use too much memory or a large amount of CPU time. I recommend that you use Process Explorer of Sysinternals (the highlighted NetBus Trojan below) because it provides more information about running processes, and kill processes that are not supposed to be killed in a more reliable way.
You may think, it looks too strong-how can you catch things loaded into your Windows server. When you think about it, you will find that it is not actua
exploits, including obtaining remote service access permissions, password resetting and cracking, sniffing network traffic, automated vulnerability attacks and web vulnerability scanning, web server scanning, blocking requests, code injection, cross-site scripting, and other popular hacker technology and tools; chapter 2 introduces the methods and precautions for using backdoors and rootkit, and focuses on the use, detection, and defense technologies of Netcat, cryptcat,
How to remove Trojan tips:
1, by the Trojan client program
The name and version of the Trojan are judged by the suspicious filenames previously found in Win.ini, System.ini, and the registry. For example, "NetBus", "Netspy" and so on, it is obvious that the corresponding Trojan is NetBus and Netspy. From the Internet to find its corresponding client program, download and run the program, in the client pro
31337-j DROPSome Trojans scan services on ports 31337 through 31340 (that is, the elite ports in the hacker language). Since legitimate services do not use these non-standard ports to communicate, blocking these ports can effectively reduce the chance that your network may be infected by the machine and their remote primary server for independent communicationThere are other ports as well, like: 31335, 27444, 27665, 20034 NetBus, 9704, 137-139 (SMB),
language). Since legitimate services do not use these non-standard ports to communicate, blocking these ports can effectively reduce the chance that your network may be infected by the machine and their remote primary server for independent communicationThere are other ports as well, like: 31335, 27444, 27665, 20034 NetBus, 9704, 137-139 (SMB), 2049 (NFS) port should also be banned, I write in this is not all, interested friends should go to check th
(that is, the elite ports in the hacker language). Since legitimate services do not use these non-standard ports to communicate, blocking these ports can effectively reduce the chance that your network may be infected by the machine and their remote primary server for independent communicationThere are other ports as well, like: 31335, 27444, 27665, 20034 NetBus, 9704, 137-139 (SMB), 2049 (NFS) port should also be banned, I write in this is not all,
legitimate services do not use these non-standard ports to communicate, blocking these ports can effectively reduce the chance that your network may be infected by the machine and their remote primary server for independent communicationThere are other ports as well, like: 31335, 27444, 27665, 20034 NetBus, 9704, 137-139 (SMB), 2049 (NFS) port should also be banned, I write in this is not all, interested friends should go to check the relevant inform
legitimate services do not use these non-standard ports to communicate, blocking these ports can effectively reduce the chance that your network may be infected by the machine and their remote primary server for independent communicationThere are other ports as well, like: 31335, 27444, 27665, 20034 NetBus, 9704, 137-139 (SMB), 2049 (NFS) port should also be banned, I write in this is not all, interested friends should go to check the relevant inform
31337-j DROP[[email protected] ~]# iptables-a output-p tcp--dport 31337-j DROPSome Trojans scan services on ports 31337 through 31340 (that is, the elite ports in the hacker language). Since legitimate services do not use these non-standard ports to communicate, blocking these ports can effectively reduce the chance that your network may be infected by the machine and their remote primary server for independent communicationThere are other ports as well, like: 31335, 27444, 27665, 20034
control can easily add a user account.
Although root kits typically appear on UNIX systems, attackers can also place a backdoor in Windows NT through seemingly legitimate programs. Backdoor procedures like Netbus,backorifice and masters of Paradise allow attackers to penetrate and control the system. Trojans can be generated by these programs. If the attacker is cunning enough, he can make these Trojans avoid some virus detection programs, of course
interface, when users enter user name and password in this interface, the program will transfer them to a hidden file, and then prompted the error to ask the user to re-enter again, the program then call the real login interface to allow users to log in, The user is then given a file with a user name and password that is almost imperceptible. There are many so-called Trojan horses on the internet, such as the famous Bo, backdoor, NetBus and the domes
recommended
Lockdown 2000 can prevent hacker programs, can prevent some conventional attacks such as Ne
Tbus, SubSeven ...The cleaner can clear the hacker program and prevent it from running. But in the face of new hacking software, such as glaciers ... $C (share C disk, such as homemade hacker software) and so on ... It has been powerless. Intruder Alart 99 to prevent any attack against you!
9.The Cleaner
A specialized program to detect and purge Trojan horses that invade your system, buil
shutting down properly)Copy CodeThe code is as follows:Iptables-a input-i lo-p all-j ACCEPT (if INPUT DROP)Iptables-a output-o lo-p all-j ACCEPT (if OUTPUT DROP)Write the output chain below, the default rule for the output chain is accept, so we write a chain that needs drop (discard).Reduce insecure port connectionsCopy CodeThe code is as follows:[[email protected] ~]# iptables-a output-p TCP--sport 31337-j DROP[[email protected] ~]# iptables-a output-p TCP--dport 31337-j DROPSome Trojans scan
, and then Mediaplayer1 recorded the sound into the file. Some of the parameters of Createwav process are as follows: The first channels for the channel, 1 o'clock for the mono, and 2 o'clock for the stereo. Resolution also has only two values to choose from, 8 o'clock on behalf of 8-bit voice, 16 o'clock to represent 16-bit voice, rate is the voice frequency, such as 11025,22050, 44100. The greater the value, the clearer the sound, and of course the larger the recorded file. The last argument r
ACCEPT (if INPUT is set to DROP)
Allow loopback! (Otherwise, DNS may fail to be shut down normally.) IPTABLES-a input-I lo-p all-j ACCEPT (if it is INPUT DROP)
IPTABLES-a output-o lo-p all-j ACCEPT (if it is output drop)
The OUTPUT chain is written below. The default rule of the OUTPUT chain is ACCEPT, so we will write the chain that requires DROP (discard). Reduce insecure port connections [root @ tp ~] # Iptables-a output-p tcp -- sport 31337-j DROP [root @ tp ~] # Iptables-a output-p tcp --
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.