Security Basics mailing list archives

FW: Data Interpretation


From: "Murda Mcloud" <murdamcloud () bigpond com>
Date: Wed, 18 Mar 2009 15:34:24 +1000

Luckily, this list works like a peer review.

Thanks for setting the record straight Ansgar. +1 to all your replies.

Hopefully the OP, Michael was not confused too much by the erroneous reply
before.



-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On
Behalf Of Ansgar Wiechers
Sent: Wednesday, March 18, 2009 1:22 AM
To: security-basics () securityfocus com
Subject: Re: Data Interpretation

On 2009-03-17 ????????????? * wrote:
All these are remote admin trojans.

No. All of them are ports commonly used by those backdoors. That alone
doesn't say anything about which service is listening on that port. And
since the ports are filtered, it's not even clear if there's a service
listening on any of them in the first place.

Looks that your system is compromised.

No, it doesn't.

Since they are filtered first telnet to these ports & see if they
open.

How would he connect to those ports when access to them is obviously
being filtered?

Regards
Ansgar Wiechers
-- 
"The Mac OS X kernel should never panic because, when it does, it
seriously inconveniences the user."
--http://developer.apple.com/technotes/tn2004/tn2118.html

------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Find the source of cybercrime! Almost every crime today involves a computer
or mobile device. Learn how to become a Computer Forensics Examiner in
InfoSec Institute's hands-on Computer Forensics Course. Up to three industry
recognized certs available, online computer forensics training available. 

http://www.infosecinstitute.com/courses/computer_forensics_training.html
------------------------------------------------------------------------


------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Find the source of cybercrime! Almost every crime today involves a computer or mobile device. Learn how to become a 
Computer Forensics Examiner in InfoSec Institute's hands-on Computer Forensics Course. Up to three industry recognized 
certs available, online computer forensics training available. 

http://www.infosecinstitute.com/courses/computer_forensics_training.html
------------------------------------------------------------------------


Current thread: