
Security Basics mailing list archives
FW: Data Interpretation
From: "Murda Mcloud" <murdamcloud () bigpond com>
Date: Wed, 18 Mar 2009 15:34:24 +1000
Luckily, this list works like a peer review. Thanks for setting the record straight Ansgar. +1 to all your replies. Hopefully the OP, Michael was not confused too much by the erroneous reply before. -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Ansgar Wiechers Sent: Wednesday, March 18, 2009 1:22 AM To: security-basics () securityfocus com Subject: Re: Data Interpretation On 2009-03-17 ????????????? * wrote:
All these are remote admin trojans.
No. All of them are ports commonly used by those backdoors. That alone doesn't say anything about which service is listening on that port. And since the ports are filtered, it's not even clear if there's a service listening on any of them in the first place.
Looks that your system is compromised.
No, it doesn't.
Since they are filtered first telnet to these ports & see if they open.
How would he connect to those ports when access to them is obviously being filtered? Regards Ansgar Wiechers -- "The Mac OS X kernel should never panic because, when it does, it seriously inconveniences the user." --http://developer.apple.com/technotes/tn2004/tn2118.html ------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Find the source of cybercrime! Almost every crime today involves a computer or mobile device. Learn how to become a Computer Forensics Examiner in InfoSec Institute's hands-on Computer Forensics Course. Up to three industry recognized certs available, online computer forensics training available. http://www.infosecinstitute.com/courses/computer_forensics_training.html ------------------------------------------------------------------------ ------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Find the source of cybercrime! Almost every crime today involves a computer or mobile device. Learn how to become a Computer Forensics Examiner in InfoSec Institute's hands-on Computer Forensics Course. Up to three industry recognized certs available, online computer forensics training available. http://www.infosecinstitute.com/courses/computer_forensics_training.html ------------------------------------------------------------------------
Current thread:
- RE: Data Interpretation, (continued)
- RE: Data Interpretation Alexis Grigoriou (Mar 17)
- Re: Data Interpretation τ∂υƒιφ * (Mar 17)
- Re: Data Interpretation Ansgar Wiechers (Mar 17)
- RE: Data Interpretation David Gillett (Mar 17)
- Re: Data Interpretation Ansgar Wiechers (Mar 19)
- RE: Data Interpretation David Gillett (Mar 20)
- Re: Data Interpretation Ansgar Wiechers (Mar 24)
- Re: Data Interpretation David Schekaiban (Mar 17)