Solved

DO_NOT_TRUST_FIDDLER has hijacked a laptop

Posted on 2014-10-29
4
85 Views
Last Modified: 2015-04-12
I am having a problem with on of m laptops.   the DO_NOT_TRUST_FIDDLER seems to have hijacked a laptop at my company.   I can't find any software that would have installed it, and it's wreaking havoc with secured services, including email.   I can't find any method of removing it.  Does anyone have any experience?
0
Comment
Question by:OrderlyChoas
  • 2
4 Comments
 
LVL 58

Accepted Solution

by:
Gary earned 250 total points
ID: 40411806
0
 
LVL 6

Expert Comment

by:Wylie Bayes
ID: 40411836
I would do what the thread Gary posted says.. On top of that if it's only limited to one laptop I would download the latest copy of Kaspersky Rescue disk and burn it to a CD.  Boot the laptop off the cd and let the rescue disk run all the way through.  

If you can connect it to your network, wireless etc, so that it can pull down the latest definitions prior to it running the sweep, would be preferred.

If this is a known issue and has a fix, kaspersky rescue should find it and remove it.

http://support.kaspersky.com/us/4162
0
 
LVL 33

Assisted Solution

by:Dave Howe
Dave Howe earned 250 total points
ID: 40412698
lol. DO_NOT_TRUST_FIDDLER is the https interception certificate for this (free, legitimate) software

Fiddler is an intercepting proxy used for debugging https problems. If you are seeing its certificate errors in https traffic, that means the browser in question is being configured to send its traffic via fiddler; to investigate, you should look to see what the browser proxy settings are set to (if its localhost, then fiddler is installed locally; AV won't detect it as it is legitimate software)
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 40412700
@Gary: Lol, I see I gave a similar answer to that one too :)
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
A list of top three free exchange EDB viewers that helps the user to extract a mailbox from an unmounted .edb file and get a clear preview of all emails & other items with just a single click on mailboxes.
The basic steps you have just learned will be implemented in this video. The basic steps are shown to configure an Exchange DAG in a live working Exchange Server Environment and manage the same (Exchange Server 2010 Software is used in a Windows Ser…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question