[20:09] Hello everyone. :*) [20:09] Thank you all for coming! Allow me to first mention how excited I am about holding this class. It has been quite a while since the Help Committee has held any classes, so this is somewhat of a first if you will. :) [20:09] This class was organized because we noticed that there was a big difference in the answers that a user could get to same question ... all depending on which help channel they might have asked it in at the time. [20:10] This information session is specifically about the current situation on the most wide-spread viruses, backdoors and trojans. [20:10] I would very much like to thank RichG aka Richku for getting all the information to me ... and at very short notice at that! [20:10] * LadyDana grins at Richku [20:10] There are also the various #NoHack ops and DALnet exploits@ team members who have made themselves available to answer any questions that you may have. [20:10] *cough* :) [20:11] It's also very likely that some of these people will have things to add at the end (or even during ;) the session. They are quite more knowledgable about this than me. [20:11] So, a big big thanks to all of you!! *hugs* [20:11] Just a short sidenote before everyone starts asking me the same question. YES, this class is being logged and YES, it will be made available in a little while to anyone who wants it. [20:11] *hides* [20:11] Now, on to the interesting stuff ;) [20:12] I don't really like moderating a class, but due to the great number of people present here today, we don't really have a choice ... [20:12] If you have questions then *please* HOLD ON to them. There will be moments throughout the class when we will have Question and Answer sessions. [20:12] There are already people asking me about the +m ;) [20:13] Speaking of Questions and Answers, that's how the introduction of the information session has been set up. There are some common questions that often get asked, so we will start with them ... just to warm you up! ;) [20:13] ееееееее Introduction ееееееее [20:13] [Q] 'What is a computer virus?' [20:13] [A] A piece of programming code that infects other computer [20:13] files/media and sometimes causes damage. [20:14] [Q] 'What is a trojan horse virus?' [20:14] [A] A piece of programming code that does NOT infect other computer files/media, but just causes destruction or annoyance. [20:14] [Q] 'What is a backdoor trojan horse virus?' [20:15] [A] A piece of programming code that, when executed, hides in the background listening for connections over the Internet or a LAN. [20:15] Usually they allow complete manipulation of the infected computer. [20:15] [Q] 'What is a worm?' [20:15] [A] A piece of programming code that does nothing but spread and sometimes destroy. [20:15] [Q] How do backdoor trojan horse viruses work? [20:16] [A] (psst, I'm horrible at ASCII art so be kind ;) [20:16] - Infected computer (server) = A. [20:16] - Hacker A (client over Internet) = B. [20:16] - Hacker B (client over LAN) = C. [20:16] A --- Internet --- B [20:16] | [20:16] LAN (local area network) [20:16] | [20:16] C [20:17] (Woohoo! It worked! ;) [20:17] In this case, we are presuming there are two hackers: One connected to [20:17] the Internet and one on the same LAN as the infected computer (A). [20:17] The CLIENT part of the trojan can connect to the SERVER part (the server runs on the infected computer) and once the connection is established, the server executes any commands sent from the client. [20:18] So .. do you have any questions? If so, please /msg Dana-Class ME!! <-- I'll voice you one by one. [20:18] cool [20:18] im first :) [20:19] MY question is generally, do you know which virus is affecting DALnet the most? [20:19] i mean has there been any trending done to see? [20:19] We will actually list some of the most common ones and their characteristics in a bit :) [20:19] There are also at least 2 nohack mailing lists that I am aware of .. [20:19] ic [20:19] They are composed of people from many different networks who exchange information with each other. [20:20] It would be nice to see by class, if it was possible, which virus's are targeting here the most. [20:20] thanx for answering :) [20:20] im done [20:20] =) [20:20] BadDreams: Be aware that with the new ircd code, some of us ARE beginning to keep some records on what viruses are present on the network. [20:20] Actually, I believe that KitFox has some stats for you a bit later on [20:21] * KitFox is just trying to figure out how to set up the overhead projector. He'll have the stats then. [20:21] *smile* [20:21] Wuher? [20:21] Dana r0x0r! *erp.. settles down and asks* Do all akill/kline reasons under the subjects we're covering here come under (exp/specific), or is there another entitlement 'sides exploits? [20:22] yes Wuher [20:22] we have all or try and have all of our akills with codes [20:22] they can be found at http://kline.dal.net/exploits/exploitsakill.htm [20:23] :) [20:23] Anything else Wuher? [20:24] Well, Wuher seems to have fallen asleep .. I'll just move on to the next person [20:24] hmmm so is it possible for a virii being run from a client machien to actually corrupt the registry of a server under a win98 network? [20:25] Only if the client machine has access to the server, or the virus infects the server [20:25] mm i guess thats more of a networking security issue, thanks anyway :) [20:26] what is the best virus scanner to use against the trojans that are rapidly infecting dalnet? [20:26] Zeus- common sense [20:26] [awni2] no. i mean to recommend to others. [20:26] awni has spoken :) [20:26] lol. [20:27] The Cleaner, a trojan remover, is a good one.. [20:27] most virii that spread on dalnet are new [20:27] norton, mcaffee [20:27] those are two good ones [20:27] it's updated weekly with the newest trojan definitions [20:27] so antivirus programs don't have them covered when they hit [20:27] alright. thanks [20:27] so if you get the virus when it first hits, your antivirus won't help you [20:27] I send any that i get to www.nai.com or to www.sophos.com [20:27] We do make every attempt to forward any virus files we locate to AntiVirus companies to include in their scanners. [20:27] Last one for now .. :) We can have a free for all at the end [20:27] www.moosoft.com if you're interested [20:27] just one think: it doesn't make sense to write in a akill/kline msg that someone should join #nohack... I've seen some victims who were in our channel and they've got akilled... not really full of sense, sorry. [20:28] Trend Micro also gets copies. [20:28] We try to refer people to the website more than anything else .. [20:28] However, there are some people that don't pay attention to kills [20:29] They just keep coming back over and over again, still infected and ignoring the advice. [20:29] A very short akill is a good way to actually get their attention .. but it's usually used as a last resort. [20:29] yes I know... but I've seen some msg's with that channel .... I know that you like the website so just don't mention #nohack :) [20:29] :) [20:29] if they get lost when they go to the website, once the akill is over they can join #nohack and get help [20:30] good point sour .. :) [20:30] hmm ok... but again, I've seen them akilled when they were in #nohack [20:30] 'i was told to go to www.nohack.net/jday.html, i went and did what it told me to do, can you please tell me if i'm still infected?' [20:30] Miscommunications happen :) [20:31] Thank you GoodBoy26. :) [20:31] sometimes they get akilled because they're lagged [20:31] no prob [20:31] * LadyDana continues ... [20:31] the ircop who akills them doesn't see them join #nohack [20:31] ееееееее Methods of Infection ееееееее [20:31] The following files can contain harmful programming code: (flood coming up .. ) [20:32] ° .com - MS-DOS programs. [20:32] ° .vbs - Microsoft Visual Basic scripts. [20:32] ° .js - Java scripts. [20:32] ° .scr - Screensavers. [20:32] ° .exe - Windows programs. [20:32] ° .doc - Rich-Text (WordPad) documents. [20:32] ° .xl? - Microsoft Excel spreadsheets. [20:32] ° .dot - Microsoft Office Document Templates. [20:32] ° .bat - MS-DOS Batch Files. [20:32] ° .tsk - Windows Task Scheduler files. [20:32] ° .inf - Windows configuration settings/scripts. [20:32] ° .ocx - ActiveX controls. [20:32] ° .pif - Program information files. [20:32] [20:32] * Important * [20:33] You should note that there are more, but that these are the most common/dangerous ones. Ideally (and sensibly), don't run an unknown file without checking it out with a virus scanner first. [20:33] Here is some misc. information :) [20:33] The Windows Scripting Host is installed by default with Windows 98. It allows .vbs and .js files to be executed and processed. [20:34] WordPad has an exploit which allows programs embedded in WordPad/Microsoft Word documents (.doc files) to be executed automatically when the document is opened. [20:34] Program information files (.pif files) can also be exploited: If coded properly, these files can function exactly like MS-DOS Batch files (.bat files). [20:34] The Jpg.bat worm sends itself using raw socket commands, instead of mIRC's own, built-in DCC system. This allows the worm to spread without this being noticed by the infected user. [20:35] I'll quickly go on to the first virus/backdoor/trojan. [20:35] ееееееее Judgement Day ееееееее [20:35] -> Removal: http://www.nohack.net/jday.html [20:35] Judgement Day is a farily new IRC worm. It is distributed as .vbs files (Visual Basic Scripts) and .js files (Java Scripts). [20:35] It invisibly creates an IRC drone which connects like a normal user but... [20:36] ° listens for commands which can manipulate the IRC drone or the infected user's computer; [20:36] ° sends the Judgement Day worm to anyone who joins a channel the IRC drone is on; [20:36] ° accepts any files sent to it (only some versions of Judgement Day do this because some are buggy); [20:36] ° looks for the biggest channels and joins them; [20:36] ° spies on the infected user's conversations. [20:36] Judgement Day has been pretty much wiped out from DALnet, thanks to the cooperation of infected channels and helpers. [20:37] Okay, second Question & Answer session .. we'll take 5 only :) If you have already asked a question then please give others a chance. [20:37] /msg Dana-Class ME!! <-- for a question [20:38] Three questions: 1. Is there a diffe [20:38] rence between a trojan horse and virus? 2. Does a trojan replicate or does just a virus replicate? 3. Where does a computer virus hide in your pc? [20:38] bad typos sorry [20:38] * awni2 wants to answer [20:38] shoot [20:39] a trojan is a program that poses as a good file , but it is not [20:39] k [20:39] a trojan does NOT copy itself to other files [20:39] a trojan may copy itself to other places on the hard disk or over a network [20:40] a virus is not a whole program , it needs other programs to 'live' [20:40] hmmm, I didn't think a trojan horse replicated itself [20:40] like a biological virus , it has to reside inside anoter program [20:40] it depends on how the trojan is programed [20:41] if you are refering to backdoors , some replicate , some don't [20:41] most of them don't [20:41] does a virus hide itself in storage areas on your pc? [20:41] there are 2 types of virii [20:41] file infectors , and boot infectors [20:42] k [20:42] file infectors infect files , and boot infectors hide in the boot sector [20:42] you get a bott infector from a boot disk I assusme [20:42] assume [20:42] at the end of the class , i'd like to talk about where backdoors usually hide [20:42] k [20:42] thanks [20:42] =) [20:43] thanks [20:43] ^_^ [20:43] one question only :) [20:43] Many channels on Danet are putting up bots to cycle the channel looking for users sending viri [20:44] is there and thought being given to the idea of dalnet prviding this service to channels in a bot the network owns [20:44] a lot of bots are run by the massads@ team [20:44] originally, they were meant to catch spam only [20:44] now, they have also diversified to catch dcc sends [20:44] HorseC: Be aware that as well, we have added some features to the ircd that block virus sends in most circumstances. [20:45] *Pyr0s* you can tell the user that .. having a single bot owned by the network would be bad, because scripts could easily avoid sending the virus to the bot if it had always the same nickname [20:45] Thanks LD, and kit.... some general information on how to request these bots and about the services in the ircd would be nice, but not in this forum :) [20:45] That's a very good point too Pyr0s .. thank you [20:46] Thanks for the question HorseC :) [20:46] eh [20:46] heh [20:46] sorry [20:46] ok [20:46] hold on, i forgot my question [20:46] oh yes [20:46] *sigh* [20:46] ;) [20:46] what are some typical signs of infections? [20:47] what should the avg joe look for [20:47] Sending files that you do not try to send... [20:47] People asking you "Why are you trying to send me this?" when you didn't send them anything... [20:47] If a stranger is sending you a file .. you should be suspicious in general .. [20:47] Getting akilled with a message saying "Hey! You have a virus!" [20:47] well say, what if your infected with sub7 and your by some off chance, not sending files to ppl [20:48] i mean, if someone's only having their cd try open/closed they may think its just the pc [20:48] is there any signs or alterations windows may give to let a person know they have a infection? [20:48] If you are infected with any major backdoor trojan, like SUb7, Back Oriface, etc, then there are USUALLY no outward signs of the infection at all. [20:48] well, thats not totally true [20:48] BadDreams i'll talking about that at the end of the class :) [20:48] sub7, netbus all change your windows key in the info screen [20:48] okay, neat :) [20:48] BadDreams, let's hold it off for the end, k? ;) [20:48] np [20:49] Speaking of the devil .. :) [20:49] ееееееее SubSeven ееееееее [20:49] -> Removal: http://split.netset.com/miscfix/subseven.shtml [20:49] SubSeven is probably the most popular and wide-spread trojan horse virus at the moment, as it boasts lots of different features and a highly-configurable server component. [20:49] SubSeven allows the server to connect to an IRC server and broadcast the infected computer's IP address, the server's port and password and a note. It also accepts limited commands. [20:50] It's a little extensive to go into in detail for this information session, so I invite you all to go to http://subseven.slak.org if you are interested in more information. :) [20:50] ееееееее Jpg.bat ееееееее [20:50] -> Removal: http://www.nohack.net/bin/JpgBatRem.exe [20:51] There are two variants of Jpg.bat, the only difference between them, really, is that the second variant constantly sends files to people on channels. [20:51] As mentioned above, Jpg.bat (ribbed) does not use mIRC's built-in DCC system to spread, it uses raw socket commands, invisibly. [20:51] Jpg.bat also contains a backdoor and sends messages to certain channels, containing information about what the infected user is doing. [20:52] ееееееее Movie.avi.pif ееееееее [20:52] -> Removal: http://www.nohack.net/bin/movierem.bat [20:52] This worm is fairly new. It exploits Windows' vulnerability to run and process .pif files in the same way as .bat files. [20:53] This worm is not really very dangerous... and it's boring :) So that's that, *ahem*. (Richku) [20:53] Question and Answer Session! :) /msg Dana-Class ME!! <-- limited. [20:53] :p [20:54] with these sockets, how would a user know they were infected? [20:54] they might not beleive people when they say they are [20:54] 'i'm not sending anything!' [20:54] Having people ask them "Why the heck are you trying to send me this?" or being akilled or killed for sending. [20:54] good point , and in many cases , they don't believe it :( [20:54] they might not beleive people when they say they are sending.. [20:55] an akill makes a believe out of u :P [20:55] *ponder* Most backdoors/trojans allow people to control you. [20:55] what are the chances of an akill? [20:55] of infected users [20:55] If you can make them say something or do something .. it's proof. [20:55] Very high in some circumstances. [20:55] thanks [20:55] Occasioanlly, we run a system to automatically akill them with a special message when they attempt to send a virus file. [20:55] thats all [20:56] ok :) [20:56] I was just wondering are there any viruses/trojans currently able to affect/infect without recieving a file through dcc? [20:56] Yes. [20:56] is there a list and or any defense against them? [20:57] through email and in some scripts [20:57] Some viruses and trojans take advantage of Open Windows SMB shares. [20:57] There is no list currently compiled. To defend against them: Don't leave any shares on your computer open. [20:57] ok thats what I was wondering Kitfox ty [20:58] :) [20:58] ty awni2 I knew those too :) [20:58] Do all these virus and removals work the same either for mIRC or pIRCh or vIRC, or whatever the client is? [20:58] Also, may of these are now being detected by AV programs. As we find more, we get them added to the DAT files. [20:58] 99% of the viruses are Client-specific. [20:58] And the VAST majority of them infect ONLY mIRC. [20:59] i've only seen one that affects pirch , tune.vbs [20:59] ok thanks, =) [20:59] :) [20:59] So, I guess you could say that one of the best ways to avoid these viruses is to not use mIRC. [20:59] Thank you Dalila. [21:00] i talk too much [21:00] <^IQ^> seein as the majority of people here are unlikely to accept files they dont know about, and we're therefore only (really) gonna be hit by them shares type virii.... [21:00] <^IQ^> how do we MAKE SURE we're safe from them...? [21:00] Don't Share. [21:01] <^IQ^> urmmm, what's sharing? [21:01] <^IQ^> <--stoopid [21:01] If you do not have any shares on your system, Share viruses can't put themselves on your system. [21:01] Sharing is WIndows FIle Sharing. [21:01] That is when you have the folder or disk drive with a little hand under it, allowing other people to access it over the network. [21:02] <^IQ^> arrrr, brillyant, that'll about do me, danke :o) [21:02] :) [21:02] last one, Aries1 [21:02] www.grc.com has more info [21:02] on sharing [21:02] hiyas ... thanx ... just a quick question [21:02] Jpg.bat also contains a backdoor and sends messages to certain channels, containing information about what the infected user is doing. [21:02] now ... is that like the JD ? [21:02] as in echoing the hosts actions etc ? [21:03] pretty much, yes [21:03] ick ... ok thanx :O) [21:03] :) [21:03] * LadyDana moves on ... [21:03] ееееееее EXbuz/Profiles ееееееее [21:03] -> Removal: http://www.nohack.net/bin/EXbuzRem4.exe [21:04] This worm is pretty old, it doesn't do much but spread. However it does disable some mIRC commands so that it cannot be removed manually. [21:04] This worm also uses different names: [21:04] (flood coming up again ..) [21:04] ° yourway.exe [21:04] ° megamirc.exe [21:04] ° photo.exe [21:05] ° viagra.exe [21:05] ° pppboost.exe [21:05] ° grana.exe [21:05] ° emails.exe [21:05] ° overnuke.exe [21:05] ° putas.exe [21:05] ° sexy.exe [21:05] ° nukescan.exe [21:05] ° soueu.exe [21:05] ° videosex.exe [21:06] If you are in the habit of joining bit chat channels such as #teens, #chatzone, etc. chances are that you have already run into one of those. [21:06] The trojan also attempts to extract a file named 'com.exe', but this fails as the file is corrupted. [21:06] ееееееее Script.ini ееееееее [21:06] This one's pretty much gone, but some important points here... [21:06] ° most versions of script.ini block commands which would allow it to be removed; [21:06] ° some versions of script.ini will DELETE ALL DATA on a user's hard drive if /remote off is typed. [21:07] So please do NOT tell users to type /remote off, /remove etc .. it can have pretty bad consequences on the user's harddrive. [21:07] ееееееее Other Things ееееееее [21:07] Just some general FYIs... (after this we'll have a Q&A session again .. then it will be KitFox's turn :) [21:08] ° ANY file-type can be loaded into mIRC; [21:08] ° a free, online anti-virus can be found at http://housecall.antivirus.com; [21:08] ° some viruses will ignore you if you mention words like: virus, trojan, worm, infected; [21:08] ° Dr. Watson (C:\Windows\Drwatson.exe) is a great diagnostic program that comes with Windows 98; [21:08] ° you can see active connections by typing netstat -a in any MS-DOS prompt window, or type netstat -a >> ns.txt to write the output to ns.txt; [21:09] ° to check if a user's port is open, ask them to type: /run telnet localhost ; [21:09] ° trojans aren't written to be found... ! [21:09] And I know that this has been mentioned before .. but do *not* run files from strangers without checking it first! [21:09] AND... [21:09] Question & Answer Session .. (last moderated one :) [21:10] woops ;) [21:10] * LadyDana waits for KitFox :*) [21:10] Be aware that NOT ALL VIRUSES are detected by AV programs. (Ladymorgaine knows this. :)) [21:10] Done. :) [21:10] :)) [21:11] okay, questions --> /msg Dana-Class ME!! [21:11] oh [21:11] lol ok is there a way to scan the ini or mrc viruses to look for specific lines that occur in the viruses? [21:12] could you use a $read command line to look for a line found in common viruses [21:12] Currently, no. And most AV programs do NOT scan TXT-type files, such as mIRC scripts, due to the processing power required to do this. [21:13] hmmm ok is there a way to list the mrc or ini without getting infected? [21:13] Yes [21:13] Just load it in notepad. [21:13] mIRC scripts are 100% plantext or .ini files. [21:13] ok thank you will work on the rst :)) [21:13] :) [21:13] .ini files are just plaintext with INI beginnings. [21:13] heh thanks for taking me once again ;) is it possible for a virus to actually spread itself by pretending to be a "service" that sends itself to itself and resides in another directory and those two speard like that ect ect.. ? if it is possible is there a virus that does this? [21:14] Viruses will use any method they can to try to spreead themselves. [21:14] SOme will pretend to be a picture of a fireman licking a dog.... [21:14] Some will pretend to be a cool file from a friend... [21:15] Some will pretend to be a movie, or a text file of X-Rated passwords.... [21:15] ok thanks. [21:15] The file attempt to spread itself by whatever method the writer has it try. [21:15] thanks again LordKaT :) [21:15] Some ppl have networks which needs file sharing turned on, will a firewall help prevent viruses in that case? [21:16] Passwords will help. Secure passwords are best, but any password will USUALLY prevent a virus from being able to utilize the share. [21:16] K, thanks :) [21:16] Also, setting the share Read Only, is a good idea too. [21:17] SnowHawke do u need it share over the internet ? [21:17] or just over a LAN ? [21:17] Having a share Full Access with no password is... well, simply put, Just Plain STUPID AS ALL HELL [21:17] Just over a LAN [21:17] If you use a modem to dial into the internet, you can NOT bind WIndows FIle Sharing to the dialup networking adapter... [21:17] then don't bind ur NIC to tcp/ip [21:17] * LadyDana sets some ice cream in front of KitFox to cool him down ;) [21:18] cable modem, no dailup [21:18] * awni2 gets fired up to get some ice cream [21:18] SnowHawke: If you use TCP/IP for file sharing, and have an open share, then anybody on the internet can access it [21:19] Ok, thanks KitFox [21:19] thank you SnowHawke :) [21:19] okay, no other questions .. [21:19] Cable Modems, DSL, and other Always On connections are some of the worst for this, where people share their C drive ith no password, so that ANYBODY can do anything to their files at all. :) [21:19] * LadyDana leaves the floor to KitFox :) [21:19] * KitFox has the overhead projector working too. :) [21:19] * KitFox gets out the transparency... [21:20] Virus / AV Name (If known) / Hosts [21:20] movie.avi.pif / BAT_QWERTY 8904 [21:20] Mypicture / VBS_FOOL 7396 [21:20] ribbed (jpg.bat) / BAT_WINSYS 4578 [21:20] links / VBS_FREELINK 4442 [21:20] tune / VBS_TUNE 3968 [21:20] jday .js / JAVA_JDAY 3057 [21:20] story / VBS_CHERNOBYL 373 [21:20] jday .vbs / VBS_JDAY 75 [21:20] DMSetup 1096 [21:20] EXbus 577 [21:20] script (script.ini) 563 [21:20] MrSmartvirus 408 [21:20] mypicv2 38 [21:20] Data collected over 3days 6hrs 24mins 27secs [21:20] That is the current distribution of infected hosts on DALnet, as collected by file send attempts to users who have DCC's blocked by the ircd. [21:21] That is by unique host, not by how many sends... SOOOooooo... One host sending 50 infections counts once. :) [21:23] we're taking a breath :) [21:23] And, on that note, I have been asked to inform you about the IRCD additions. :) [21:23] +er [21:23] :P [21:24] Be aware, that the information I am about to give is currently in beta test, officially, and is not necessarily the end way that things will work... [21:24] As a default, the send of filetypes thatc an be double-clicked on and execute script or code on the PC are blocked. [21:25] If a user attempts to send a file of a blocked filetype, they will receive a message indicating that it was blocked, and the user they try to send it to will receive a message as well. [21:26] Examples: [21:26] -hebron.in.us.dal.net- The user KitFox is not accepting DCC sends of filetype *.exe from you. Your file mirc1.exe was not sent. [21:26] Spoof (~i1zoI41x@adsl-63-193-151-187.dsl.lsan03.pacbell.net) has attempted to send you a file named mirc1.exe, which was blocked. [21:26] Those are what the Sender and Receiver will see. [21:27] The -RECEIVER- has to allow the DCC to be sent, currently by typing /dccallow + [21:28] Similar to a watch list, this adds a person to the DCC Allow list, which is maintained until the client logs off. [21:28] Some important questions and answers about this: [21:28] Q: Does it block ALL DCC sends?! [21:28] A: No, it only blocks sends of files that can be click-clicked and ran. [21:29] Q: Will it affect me sending my (MP3's, GIF's, JPG's, Pictures, WAV files)? [21:29] A: No, it only blocks sends of files that can be click-clicked and ran. Data files are not affected. [21:30] Q: Okay, it said MyFriend tried to send me a file and it was blocked. I added them to the allow list. Why am I not getting the file? [21:30] A: WHen a send is blocked, it is BLOCKED and lost. They need to resend the send request a second send time. [21:31] Q: Maybe I should just add EVERYBODY I meet to my dccallow list. [21:31] A: Not a good idea... SOmebody you meet could then unknowingly send you a virus and you'd be very embarrassed when your hard drive gets reformatted. [21:32] And those are the majority of the questions we get... [21:32] Any other questions? (Dana, could you handle the Q/A? [21:32] of course :) [21:33] /msg Dana-Class me!! [21:33] Could we get a list of the blocked file extensions ? [21:34] js pl exe com bat dll ini vbs pif mrc scr doc xls lnk [21:34] Thanks ... that's all [21:34] thank you GohnJalt :) [21:34] Not a question. but a note of thanks to you, and ALL the staff for taking the time to put together this class.... It is appreciated by all. (ok im done) :) [21:35] lol .. [21:35] We enjoy it .. don't we gang? ;) [21:35] yes :) [21:36] Hi, and thanks :) [21:36] You're Welcome. [21:37] OK, if I go to somewhere like grc.com, and nothing shows.....ie, no netbios connection, ports closed..........what are the chances of getting hacked/infected......apart from accepting and running a file? [21:37] Usually small. [21:37] I have a home lan, btw [21:37] Deacon_Blue do you run a firewall ? [21:37] So, I shouldn't panic and race off looking for a firewall? [21:37] awni2, no [21:38] i'd run one to be safer :) [21:38] The only way for you to become infected with something is by it exploiting a hole in your system. These holes can be backdoors, or user silliness (Clicking on an infected file) or open ports. [21:39] =) [21:39] Anything else Deacon_Blue? [21:39] hmm....backdoors.........how likely if the system has no common ports open? [21:39] Only if you ran a backdoor trojan. [21:39] Not all trojans use common ports some are programmable [21:40] OK, so files should be my main concern? [21:40] As always. [21:40] Thank you :) [21:40] Thank you Deacon_Blue :) [21:40] Thanks for all your help, and my question was answered in the "what are the blocked files" question :) so umm.. nevermind [21:41] ok :) [21:41] thanks [21:41] where can i find more infomation? [21:41] the specifics.. such as files altered [21:41] In books, magazines, classes, and online. [21:42] could you give me some sites? [21:42] Unfortunately, no. :( [21:42] ok, what would i search for? [21:42] www.nohack.net has SOME information.... [21:42] i'll give a bit of info on where backdoors can hide [21:42] www.hackfix.org [21:42] Many do not have specific information due to the fact that it allows people to exploit things more easily. [21:42] at the end of the class :) [21:42] ok thanks , i'll go there [21:42] :) [21:43] My question was URLs,,just got answered,,,are y'all planning on holding more classes like this one? [21:43] Yes. [21:43] k,,thanks :) [21:44] There is the same class for the people of other timezones on Sunday 10AM EST [21:44] Which would be 2PM GMT [21:44] You can mention it to your friends .. [21:45] okay, no more questions :) [21:45] awni2, you have the floor. [21:45] Great. I'm going to go do my taxes. :) [21:45] wish i could dance :P [21:45] Thanks KitFox [21:45] * zukeee puts on dancing music for awni2 [21:46] it was mentioned that you can use netstat to see what connections you have to your computer [21:46] you should close all applications that use the internet before running netstat so that you don't get confused [21:47] Common places for backdoors to hide : [21:47] - registry [21:47] - system.ini [21:47] - win.ini [21:47] oh, thanks zukeee :) [21:48] to access your registry , click on Start/Run and type Regedit [21:48] in Regedit , there are 3 places of interest to backdoors [21:48] HKEY_CURRENT_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN [21:48] HKEY_CURRENT_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNSERVICES [21:49] HKEY_CLASSES_ROOT\EXEFILE\COMMAND\SHELL [21:49] ops [21:49] HKEY_CLASSES_ROOT\EXEFILE\SHELL\COMMAND [21:50] grr , i need to right things down next time [21:50] * awni2 said he doesn't know how to dance [21:50] HKEY_CLASSES_ROOT\EXEFILE\SHELL\OPEN\COMMAND [21:50] there we go :) [21:51] sorry , it's 5 am here , my memory is fading [21:52] HKEY_CLASSES_ROOT\EXEFILE\SHELL\OPEN\COMMAND should have (default) as the Name and "%1" %* as the Data [21:52] if it has anything else, you might have sub7 or pretty park [21:53] run and runservices can be a bit tricky , because backdoors use names that sound like system files [21:53] rundll16.exe for example , or tskmngr.exe [21:54] it's best to get someone with some experience to help out if you're dealing with run or runservices sections [21:54] -system.ini [21:54] to get to system.ini , click Start/Run and type sysedit [21:55] this will open system.ini ,win.ini,autoexec.bat,config.sys and protocols.ini [21:55] in system.ini , look for the line Shell= [21:55] it should be , in most cases, only Shell= Explorer.exe [21:56] sometimes you'll see printer drivers on the same line, those are safe [21:57] if you see msrexe.exe , or filename.dl , then you're backdoored [21:57] -win.ini [21:57] in , win.ini , u need to look for the line Run= [21:57] in 99% of cases , you'll only see Run= [21:58] if you see Run= filename.extention , u may need help [21:59] these are the hiding places for backdoors, your windows Startup folder can be used to run a backdoor on startup , but that's not really hidden :) [21:59] any combination of these hiding places can be used [22:00] or just 1 of them [22:00] * awni2 takes off his dancing shoes :) [22:00] Okay .. [22:01] this class is officially over :*) [22:01] Thank you all for participatin g..