{"id":76,"date":"2009-03-31T10:44:00","date_gmt":"2009-03-31T10:44:00","guid":{"rendered":"http:\/\/mikemartinezonline.com\/blog\/?p=76"},"modified":"2009-03-31T10:44:00","modified_gmt":"2009-03-31T10:44:00","slug":"more-conflicker-check-for-infection","status":"publish","type":"post","link":"https:\/\/mikemartinezonline.com\/blog\/2009\/03\/31\/more-conflicker-check-for-infection\/","title":{"rendered":"MORE CONFLICKER &#8211; CHECK FOR INFECTION"},"content":{"rendered":"<p>CONFLICKER UPDATE:<\/p>\n<p>Symantec&#8217;s got a pretty simple (and free) tool specifically for Conficker:<br \/>Download <a href=\"http:\/\/www.symantec.com\/content\/en\/us\/global\/removal_tool\/threat_writeups\/FixDwndp.exe\" target=\"_blank\">this file<\/a> on an uninfected computer, follow the steps, and you should be okay. <\/p>\n<p>Or.<\/p>\n<p>Doxpara Research has release a &#8216;scanner&#8217; to check for conflicker infection.<\/p>\n<p>Security expert Dan Kaminsky, working with the Honeynet Project&#8217;s Tillmann Werner and Felix Leder, have discovered an easier way to detect if a machine on a network is infected by Conflicker.<br \/>Dan writes:&#8221;What we&#8217;ve found is pretty cool: Conficker actually changes what Windows looks like on the network, and this change can be detected remotely, anonymously, and very, very quickly. You can literally ask a server if it&#8217;s infected with Conficker, and it will tell you.<\/p>\n<p>Go here:<br \/><a href=\"http:\/\/www.doxpara.com\/\">http:\/\/www.doxpara.com\/<\/a><br \/>download the scanner:<br \/><a href=\"http:\/\/www.doxpara.com\/scs.zip\">http:\/\/www.doxpara.com\/scs.zip<\/a><br \/>Extract to folder and run it against your workstaions and servers:<br \/>Open command window &#8211; Start>run>type &#8216;cmd&#8217;<\/p>\n<p>Navigate to the exanded directory and &#8216;run&#8217; the scanner on each individual computer.<br \/>Example:<br \/>C:\\ yourdesktop \\scs\\scs>scs.exe 192.168.31.2<br \/>[For the admins out you can use a host file for a range of IPs]<\/p>\n<p>If you are unsure of how to find your IP address.<br \/>Open up command windows &#8211; &#8211; Start>run>type &#8216;cmd&#8217; then type in &#8220;ipconfig \/all&#8221;<br \/>[If you don&#8217;t know how to navigate in the DOS window check this out:<br \/><a href=\"http:\/\/www.online-tech-tips.com\/computer-tips\/how-to-use-dos-command-prompt\/\">http:\/\/www.online-tech-tips.com\/computer-tips\/how-to-use-dos-command-prompt\/<\/a> ]<\/p>\n<p>Update &#8211; Another way to scan:<br \/>1. Download and install Python 2.6.1: <a href=\"http:\/\/www.python.org\/ftp\/python\/2.6.1\/python-2.6.1.msi\">[www.python.org]<\/a> [python.org]<br \/>2. Download Impacket from <a href=\"http:\/\/oss.coresecurity.com\/repo\/Impacket-stable.zip\">[oss.coresecurity.com]<\/a> [coresecurity.com] (or maybe <a href=\"http:\/\/pypi.zestsoftware.nl\/impacket\/\">[pypi.zestsoftware.nl]<\/a> [zestsoftware.nl] or some other mirror)<br \/>3. Download the scanner from <a href=\"http:\/\/iv.cs.uni-bonn.de\/uploads\/media\/scs.zip\">[iv.cs.uni-bonn.de]<\/a> [uni-bonn.de]<br \/>4. Unpack Impacket into a folder, then install Impacket from a command line with c:\\python26\\python setup.py install<br \/>5. Run the scanner with the command c:\\python26\\python scs.py [starting_ip] [ending_ip]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CONFLICKER UPDATE: Symantec&#8217;s got a pretty simple (and free) tool specifically for Conficker:Download this file on an uninfected computer, follow the steps, and you should be okay. Or. Doxpara Research has release a &#8216;scanner&#8217; to check for conflicker infection. Security expert Dan Kaminsky, working with the Honeynet Project&#8217;s Tillmann Werner and Felix Leder, have discovered &hellip; <a href=\"https:\/\/mikemartinezonline.com\/blog\/2009\/03\/31\/more-conflicker-check-for-infection\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;MORE CONFLICKER &#8211; CHECK FOR INFECTION&#8221;<\/span><\/a><\/p>\n","protected":false},"author":587,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[48,47,83,51,1],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/76"}],"collection":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/users\/587"}],"replies":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/comments?post=76"}],"version-history":[{"count":0,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/76\/revisions"}],"wp:attachment":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/media?parent=76"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/categories?post=76"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/tags?post=76"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}