I got this block notice twice today on the campus network and I'm wonderin if anyone else has gotten it. I got it first in talley and then outside of DH Hill. Both times I got it immediately upon logging onto nomads. Here's the info:
8/18/2005 10:16:51 PM
not a real trojanBLA is real old and basically eradicated. It just happens that Windows uses a shitton of ports just above 1024 that *should* be used for registered RFC services. Basically false-positive son.
8/18/2005 10:23:24 PM
so wtf is M$ doing using a known trojan port then? I mean, why don't you just let the hackers code windows themselves and save them the fucking trouble?
8/18/2005 10:29:52 PM
8/18/2005 10:40:21 PM
well it could be MyDoom but I doubt it...Since you said that it happened immediately upon login unto NOMAD and the fact that ip is a NOMAD server lend heavily to the fact that it's part of the authentication process.ece% nslookup 152.7.232.44Server: ns5.ncsu.eduAddress: 152.1.1.248Name: nom3775it.nomadic.ncsu.eduAddress: 152.7.232.44Windows uses a lot of ports around 1024~1048 or so as dynamic (non-IANA registered) ports for internal windows services including a lot of SMB/NetBIOS/Browser type communications. Winlogon.exe listens on 1043/.It's not like Windows CHOSE to use a trojan port....I mean which came first bright fella? Windows or the trojan. Basically the trojan writers chose a port that is in a range commonly used in an attempt to hide it, if they had picked 31337 or 65535, some halfwitted admin may notice it much quicker than if it uses a port that is within a heavily used range.
8/18/2005 10:42:41 PM
there are plenty of trojans that listen on common ports like 80, 8080, 21, etc. That doesn't mean that legitimate services that have always used those ports should move to another port.
8/18/2005 10:47:38 PM
8/19/2005 8:07:21 AM
31337 is the best Trojan port evar
8/19/2005 8:19:33 AM
8/19/2005 12:53:37 PM