Fed up with Gator....How to block???

Posted on 2004-08-24
Last Modified: 2010-04-11
I need to block gator at my firewall.  Everyday, I get more and more Snort alerts with Gator and I have had it with chasing down these "infected" systems.

Does anyone have any suggestions.


Question by:Craig Sharp
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 49

Expert Comment

ID: 11881228

check this


LVL 15

Expert Comment

ID: 11881363
Get this software:

"Prevent the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted pests.
Block spyware/tracking cookies in Internet Explorer and Mozilla/Firefox.
Restrict the actions of potentially dangerous sites in Internet Explorer.

SpywareBlaster can help keep your system spyware-free and secure, without interfering with the "good side" of the web.

And unlike other programs, SpywareBlaster does not have to remain running in the background.

It works great, i have it installed and it works perfectly.

Expert Comment

ID: 11885108
It depends what kind of firewall you have.  The best way to block gator at the network/firewall level is with an intelligent firewall or proxy.  Check Point calls this "Application Intelligence" but it's basically just stateful inspection at the application level.  Some other proxies and devices can do it.

To look for gator, look at the HTTP packets for "User-Agent" = "^Gator" and block that.  As I said Check Point FW-1 NG AI can do it.  But so can some other proxies.

How to Defend Against the WCry Ransomware Attack

On May 12, 2017, an extremely virulent ransomware variant named WCry 2.0 began to infect organizations. Within several hours, over 75,000 victims were reported in 90+ countries. Learn more from our research team about this threat & how to protect your organization!


Author Comment

by:Craig Sharp
ID: 11888229
We have a PIX and it does not have anything close to intelligence.  I am thinking of writing a module for Snort using PERL that will automatically add the rules to the firewall for selected alerts.

Expert Comment

ID: 11890198
I would also use Adaware by Lavasoft, to get rid of any spyware you have.
LVL 79

Accepted Solution

lrmoore earned 500 total points
ID: 11896426
You are correct that the PIX cannot block these connections, but if you have a Cisco router in front of the PIX you would be able to use NBAR (Network Based Application Recognition) to block it..

Expert Comment

ID: 11958226
You can always edit your HOSTS file to block anything from or its relatives...

You can google how to add exceptions to c:\windows\system32\drivers\etc\hosts

It's the best bet and your web browser will simply never display anything from Gator, nor will any application.

Author Comment

by:Craig Sharp
ID: 11958912
Hi all.  Thanks for the replies.  I have accepted lrmoore's response as the NBAR is very close to what I need.  We have a complete Cisco infrastructure and this will be a good fit.

Featured Post

RoboForm Secure Password Management System

RoboForm Everywhere - Superb Browser Support
Windows / Apple / IOS / Android / Linux / Chrome OS
Use different complex passwords everywhere
Best Secure Password Management by far
Synchronize all of your devices instantly
Safe, Secure & Highly Recommended!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question