• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1782
  • Last Modified:

what port number does conflicker use?

Who has any idea about the port number used by conflicker?
0
oandosupport
Asked:
oandosupport
  • 2
  • 2
  • 2
  • +2
1 Solution
 
Grizzly072000Commented:
Apparently, port numbers for connections are hashed from the IP address of each peer (See: http://mtc.sri.com/Conficker/)

http://en.wikipedia.org/wiki/Conficker

See https://wikis.uit.tufts.edu/confluence/display/Conficker/Conficker+Resource+Page for some tools.
0
 
RartemassAuthor, martial arts coach, IT ConsultantCommented:
The port used is generally between 1024 and 10000.
0
 
Grizzly072000Commented:
For (obsolete) variants A and B only. See above article (http://en.wikipedia.org/wiki/Conficker)
0
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

 
warturtleCommented:
Hello,

I am interested in finding out if you only need the port number for Conficker propogation or you want to remove it from your machine?? If you want to remove it, then you can use the Microsoft Malicious Software Removal Tool based at:

http://www.microsoft.com/security/malwareremove/default.mspx

Hope it helps.
0
 
warturtleCommented:
I don't know if the asker got the correct answer or if the question was more than what had been asked. Hard to tell because we never heard back from the asker. Its upto other experts to decide if they want to split points for time spent or refund points to asker.
0
 
RartemassAuthor, martial arts coach, IT ConsultantCommented:
The links and advice provided by the experts could be useful for other people.
As the asker hasn't responded there is no knowing what comment provided his solution.

If giving points, the only fair way in this case would be to split between all contributing experts.

0
 
oandosupportAuthor Commented:
Thank you
0

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

  • 2
  • 2
  • 2
  • +2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now