Solved

what port number does conflicker use?

Posted on 2009-03-31
9
1,774 Views
Last Modified: 2013-11-22
Who has any idea about the port number used by conflicker?
0
Comment
Question by:oandosupport
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +2
9 Comments
 
LVL 6

Expert Comment

by:Grizzly072000
ID: 24033283
Apparently, port numbers for connections are hashed from the IP address of each peer (See: http://mtc.sri.com/Conficker/)

http://en.wikipedia.org/wiki/Conficker

See https://wikis.uit.tufts.edu/confluence/display/Conficker/Conficker+Resource+Page for some tools.
0
 
LVL 18

Accepted Solution

by:
Rartemass earned 500 total points
ID: 24033717
The port used is generally between 1024 and 10000.
0
 
LVL 6

Expert Comment

by:Grizzly072000
ID: 24033808
For (obsolete) variants A and B only. See above article (http://en.wikipedia.org/wiki/Conficker)
0
To Patch or not to Patch? That is the question!

Don't get caught out like thousands of others around the world in the recent Ransomware Fiasco!
Discuss..
- Why it's not a good idea to wait before Patching
- Sensible approaches to Patching discussed
- Add your feedback, comments and suggestions

 
LVL 16

Expert Comment

by:warturtle
ID: 24037130
Hello,

I am interested in finding out if you only need the port number for Conficker propogation or you want to remove it from your machine?? If you want to remove it, then you can use the Microsoft Malicious Software Removal Tool based at:

http://www.microsoft.com/security/malwareremove/default.mspx

Hope it helps.
0
 
LVL 5

Expert Comment

by:bRvO
ID: 24037798
0
 
LVL 16

Expert Comment

by:warturtle
ID: 24288231
I don't know if the asker got the correct answer or if the question was more than what had been asked. Hard to tell because we never heard back from the asker. Its upto other experts to decide if they want to split points for time spent or refund points to asker.
0
 
LVL 18

Expert Comment

by:Rartemass
ID: 24291898
The links and advice provided by the experts could be useful for other people.
As the asker hasn't responded there is no knowing what comment provided his solution.

If giving points, the only fair way in this case would be to split between all contributing experts.

0
 

Author Closing Comment

by:oandosupport
ID: 31565036
Thank you
0

Featured Post

Major Incident Management Communications

Major incidents and IT service outages cost companies millions. Often the solution to minimizing damage is automated communication. Find out more in our Major Incident Management Communications infographic.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question