Solved

Blaster Infection Tracing

Posted on 2004-08-23
5
284 Views
Last Modified: 2013-12-04
Hi

I have a machine on my LAN that has become infected with the Blaster Virus.

What is the quickest way to find out where this infection has come from. I bascially want a scanner that can scan an IP range and tell me if the machine has Blaster on it.

Does anyone know of such a tool?

Many thanks

Ste
0
Comment
Question by:stewatts
  • 2
  • 2
5 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 11871518
Hi stewatts,

Scan your network for PC's needing the blaster patch
http://members.shaw.ca/techcd/VB_Projects/BlasterPatched.exe

PeteL
0
 

Author Comment

by:stewatts
ID: 11871550
Hi

This web address says page cannot be displayed?
0
 
LVL 17

Expert Comment

by:Microtech
ID: 11871598
0
 

Author Comment

by:stewatts
ID: 11871673
Hi Microtech

Thanks for this but this will only scan and remove it from 1 machine. I need to be able to scan an IP range for a machine that has infected my machine.

My OS is XP BTW

Many thanks
0
 
LVL 17

Accepted Solution

by:
Microtech earned 125 total points
ID: 11872230
stewatts,
http://support.microsoft.com/?kbid=823980 download the scan tool
http://support.microsoft.com/default.aspx?kbid=827363 this doc will help you

hope this helps
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question