• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

How to detect a stealer,key-logger,trojan planted in my pc?

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Computer Forensics and Incident Response

View previous topic :: View next topic  
Author Message
manoj9372
Just Arrived
Just Arrived


Joined: 04 May 2010
Posts: 0


Offline

PostPosted: Thu May 13, 2010 9:12 am    Post subject: How to detect a stealer,key-logger,trojan planted in my pc? Reply with quote

I am suspicious about presence of a key-logger or stealer in my pc..
But I tried to analyze the traffic,I can't find any thing suspicious..
I asked to my freind he say's some malwares has anti-options so softwares like wire-shark can't detect it's traffic and he also says the keylogger will send will send the logs at a specified time interval ,so how can i detect it's traffic?
what are the other famous traffic analyzers?
And most of the hackers are advanced and the virus is completely fud(runt time),so scanning with anti-virus wont do any thing..
I also tried to look in auto-start up,I found nothing suspicious..
How can i detect it based up on the traffic from my system?
Hope i will get some help here...
Back to top
View user's profile Send private message
xandersolis
Just Arrived
Just Arrived


Joined: 27 Jul 2010
Posts: 0


Offline

PostPosted: Tue Jul 27, 2010 9:43 am    Post subject: Reply with quote

Manoj,

Have you tried checking hidden executables from your system?

dir *.exe /ASH /S

You may want to run Trend Micro's Hijackthis / SIC tool and send the log to this forum.

http://free.antivirus.com/hijackthis/

http://downloadcenter.trendmicro.com/index.php?regs=NABU&clk=latest&clkval=349&lang_loc=1


Thanks,

XanderS
Back to top
View user's profile Send private message
SecurityTrend
Just Arrived
Just Arrived


Joined: 21 Jul 2010
Posts: 0


Offline

PostPosted: Wed Jul 28, 2010 7:55 am    Post subject: Reply with quote

Do you use a firewall with permissions for individual programs. It may pay the check the permitted programs and any logs the firewall keeps.
Back to top
View user's profile Send private message
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Computer Forensics and Incident Response All times are GMT + 2 Hours
Page 1 of 1


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register