Solved

Fed up with Gator....How to block???

Posted on 2004-08-24
8
358 Views
Last Modified: 2010-04-11
I need to block gator at my firewall.  Everyday, I get more and more Snort alerts with Gator and I have had it with chasing down these "infected" systems.

Does anyone have any suggestions.

Thanks,

Craig
0
Comment
Question by:Craig Sharp
8 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 11881228
Craig

check this

http:Q_20442859.html

0
 
LVL 15

Expert Comment

by:Yan_west
ID: 11881363
Get this software:

http://www.javacoolsoftware.com/spywareblaster.html

"Prevent the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted pests.
Block spyware/tracking cookies in Internet Explorer and Mozilla/Firefox.
Restrict the actions of potentially dangerous sites in Internet Explorer.

SpywareBlaster can help keep your system spyware-free and secure, without interfering with the "good side" of the web.

And unlike other programs, SpywareBlaster does not have to remain running in the background.
"

It works great, i have it installed and it works perfectly.
0
 
LVL 1

Expert Comment

by:shanepresley
ID: 11885108
It depends what kind of firewall you have.  The best way to block gator at the network/firewall level is with an intelligent firewall or proxy.  Check Point calls this "Application Intelligence" but it's basically just stateful inspection at the application level.  Some other proxies and devices can do it.

To look for gator, look at the HTTP packets for "User-Agent" = "^Gator" and block that.  As I said Check Point FW-1 NG AI can do it.  But so can some other proxies.

Shane
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 
LVL 3

Author Comment

by:Craig Sharp
ID: 11888229
We have a PIX and it does not have anything close to intelligence.  I am thinking of writing a module for Snort using PERL that will automatically add the rules to the firewall for selected alerts.
0
 
LVL 1

Expert Comment

by:ganan99
ID: 11890198
I would also use Adaware by Lavasoft, to get rid of any spyware you have.
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 11896426
You are correct that the PIX cannot block these connections, but if you have a Cisco router in front of the PIX you would be able to use NBAR (Network Based Application Recognition) to block it..
0
 
LVL 1

Expert Comment

by:HerculesMO
ID: 11958226
You can always edit your HOSTS file to block anything from gator.com or its relatives...

You can google how to add exceptions to c:\windows\system32\drivers\etc\hosts

It's the best bet and your web browser will simply never display anything from Gator, nor will any application.
0
 
LVL 3

Author Comment

by:Craig Sharp
ID: 11958912
Hi all.  Thanks for the replies.  I have accepted lrmoore's response as the NBAR is very close to what I need.  We have a complete Cisco infrastructure and this will be a good fit.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
As technology users and professionals, we’re always learning. Our universal interest in advancing our knowledge of the trade is unmatched by most industries. It’s a curiosity that makes sense, given the climate of change. Within that, there lies a…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question