Solved

Blaster Infection Tracing

Posted on 2004-08-23
5
289 Views
Last Modified: 2013-12-04
Hi

I have a machine on my LAN that has become infected with the Blaster Virus.

What is the quickest way to find out where this infection has come from. I bascially want a scanner that can scan an IP range and tell me if the machine has Blaster on it.

Does anyone know of such a tool?

Many thanks

Ste
0
Comment
Question by:stewatts
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 11871518
Hi stewatts,

Scan your network for PC's needing the blaster patch
http://members.shaw.ca/techcd/VB_Projects/BlasterPatched.exe

PeteL
0
 

Author Comment

by:stewatts
ID: 11871550
Hi

This web address says page cannot be displayed?
0
 
LVL 17

Expert Comment

by:Microtech
ID: 11871598
0
 

Author Comment

by:stewatts
ID: 11871673
Hi Microtech

Thanks for this but this will only scan and remove it from 1 machine. I need to be able to scan an IP range for a machine that has infected my machine.

My OS is XP BTW

Many thanks
0
 
LVL 17

Accepted Solution

by:
Microtech earned 125 total points
ID: 11872230
stewatts,
http://support.microsoft.com/?kbid=823980 download the scan tool
http://support.microsoft.com/default.aspx?kbid=827363 this doc will help you

hope this helps
0

Featured Post

Is Your DevOps Pipeline Leaking?

Is your CI/CD pipeline a hodge-podge of randomly connected tools? You’ve likely got a tool to fix one problem & then a different tool to fix another, resulting in a cluster of tools with overlapping functionality. Learn how to optimize your pipeline with Gartner's recommendations

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question