Solved

I have been asigned a task of decrypting an infection and find where the information is going

Posted on 2009-05-08
5
220 Views
Last Modified: 2013-12-06
I have someone that knows who infected there computer and the computer is sending information out to the other person. Some of it is very personal and the other person had made comments about it. He wants me to decrypt the computer but not clean it to find the backdoor or other infection that is sending this information out. Maybe it is a keylogger. I don't know.
I can clean a computer very easy, but this is new to me.
What tools can I use to find what the system is using and where this information is beening sent to?
I will pay for a type of software if I have to.
0
Comment
Question by:calitech
5 Comments
 
LVL 16

Accepted Solution

by:
warturtle earned 200 total points
Comment Utility
You can use this program to see the list of programs that are currently open along with the IP address of where the information is being sent to:

http://technet.microsoft.com/en-us/sysinternals/bb897437.aspx

Hope this helps. I am hoping that this is for a good cause.
0
 
LVL 23

Assisted Solution

by:Admin3k
Admin3k earned 150 total points
Comment Utility
This type of activity is called computer forensics, it comprises an important field for Information security professionals.
you can take a look at some open source Windows forensics tools and try some for yourself.
http://www.opensourceforensics.org/tools/windows.html
TCPView is a good start, all sysinternals utilities can be run live from http://live.sysinternals.com/
you may also want to us etools from there like Process explorer, Procmon to identify what exactly is going on on that machine, e.g, if you are hunting for a keylogger, you will be able to see which process is writing to disk, thus give away the log location ,etc...
Computer Forensics on Wikipedia
hope this helps

0
 

Author Comment

by:calitech
Comment Utility
Ok so it sounds like these people sent him an email and was able to get a report of his history and bookmarks in firefox.
Any clue on how find out  if that is true?
0
 
LVL 19

Assisted Solution

by:CoccoBill
CoccoBill earned 150 total points
Comment Utility
Just by sending an email, no. If the email included a trojan as an attachment or a link to a site with malware, possibly. As Admin3k said, the activity you've been asked to perform is called computer forensics, which is quite different from cleaning up infected machines and requires fairly deep understanding of the operating system and possible attack vectors. I'd say it's quite unlikely any single tool will be able to just tell u what happened, you need to dig deep and find out yourself (or better yet, get someone who knows what they're doing to do it for you). There are various forensic toolkits available, personally I like backtrack (http://www.remote-exploit.org/backtrack_download.html), which is a linux distribution filled with various handy tools. Their wiki contains various tutorials (https://wiki.remote-exploit.org/backtrack/) to get you started if you're interested, also check out these links:

http://en.wikipedia.org/wiki/Computer_forensics
http://www.sans.org/reading_room/whitepapers/forensics/
http://www.computerforensicsworld.com/
0
 

Author Closing Comment

by:calitech
Comment Utility
Thanks for the input
0

Featured Post

Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now