Security
--
Questions
--
Followers
Top Experts
One application that trys (constantly) to get out is NDIS. I can see that it is coming from my system directory. I assume it is a WIN XP application trying to do some harmless activity. But because I am unfamiliar with it, I wanted to get an expert's opinion as to what it is trying to do.
The actual file name is "ndisuio.sys".
Thank you for any help.
Tom Houck
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Thanks for the reponsse. So is it harmless? How can I determine what application is trying to use it?
Thank you,
Tom
http://www.foundstone.com/knowledge/intrusion_detection.html
TooKoolKris
MCSE+I, CCNA, A+






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
TooKoolKris
MCSE+I, CCNA, A+

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
TooKoolKris
MCSE+I, CCNA, A+
TooKoolKris
MCSE+I, CCNA, A+






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
TooKoolKris
MCSE+I, CCNA, A+
secondly being that I have just gone through this same scenario with this file and warning I have a concern about your answer. You did not ask if there was also communication from an external IP. This would be important as it would signal that it obviously is not merely internal network communication.
The reason I am replying is because there very well could be more to it.
Use this site as a reference
http://www.sans.org/newlook/resources/IDFAQ/oddports.htm
This gives you a listing of some ports that are commonly used for trojan activity. The port listed on my attempted communication is 65432. You can see there is a trojan that is affiliated with that port. While it does not signify that I surely have a trojan which has infected my computer...nonetheless it is a possibility.
I still have not been able to find why someone is trying to communicate to that port and sys file as I used a trojan cleaning program and it did not find anything. Perhaps another program installed it and it is affiliated with that program I am not sure.
Hope this helps

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
The following applications may need to be set to allow with in the running applications list "mpsrv", "kernel32", "ntoskrnl", "svchost", "NetBeui", and possibly "tcpsvcs", "nwlnkipx.sys", "ndisuio.sys" and "ssdpsrv". These settings will need to be applied to all systems running SPF that require F&P sharing.
On all of the systems you have running Sygate, you will need to change your settings to allow this file.
Goto the Applications tab and allow
ndisuio.sys <----- bingo!
You will all find http://www.whitehat-security.com/SPF.htm very helpful. =) hope that helps
SpideyMod
Community Support Moderator @Experts Exchange






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
http://www.iceteks.com/forums/index.php?s=0c61cc87365c1408753b008c8ca04d4c&showtopic=1290&view=findpost&p=14302
I've been looking for an answer for this for ages. Disabling the wireless configuration service stops all of this excess traffic. Doesn't really explain why it was happening in the first place, but at least we know how to kill it now.
Security
--
Questions
--
Followers
Top Experts
Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.