Last updated: September 23, 2023
One day, a reader of our site wrote to me: “Ahmed, I recently read your article on how to control a PC remotely with a USB stick. So, I was wondering if we can identify a zombie PC part of a hacker's botnet, since I'm using Windows. »
In order to answer this question, I have chosen to present to you an effective method for monitor your computer activity.
In reality, when a PC is infected, it harbors a program that scans the hard drive. Indeed, it can either steal your contacts in order to send them to databases for spam, or establish a link with other infected machines in order to create a botnet.
In any case, certain symptoms should not be ignored, such as:
- Starting the fan at full speed while the computer is asleep.
- An abnormally long computer shutdown time.
- Friends who receive emails from you that you never sent.
- A particularly slow Internet connection.
- The untimely appearance of advertising pop-ups, including when your browser is closed.
How to spot a hidden intrusion on your computer
Step 1: Using TCPView
We'll start by using a free tool called TCPView.
Indeed, this tool allows you to monitor TCP/IP protocol activity on your computer. Unlike Windows' built-in tools, TCPView tells you exactly which process is associated with each TCP/IP connection.
Here's how to use it:
- First of all, download TCPView and unzip it.
- No installation is necessary. Simply double-click on the “Tcpview.exe” file to launch the application.
- Once opened, TCPView updates every second to show you network exchanges between your PC and other devices or sites on the Internet.
One of the advantages of TCPView over command netstat
is its ability to interrupt a specific connection without closing the process that manages it.
Step 2: Identifying a possible backdoor on your PC
The TCPView tool can help identify an intrusion on your system in several ways:
- See your connections : It shows all TCP and UDP connections. So you can spot if a unknown IP address attempts to connect to your PC.
- Identify connected programs : If an unexpected program establishes a connection, this may be a warning sign.
- Search for strange addresses : Unknown or strange IP addresses may indicate a problem. TCPView displays them for you.
Basically, if your PC is infected, you could see strange IP addresses.
Example : In the screenshot below, you will observe all the connections currently open on my computer.
Pay special attention to remote addresses that seem suspicious.
In summary, TCPView shows you who is chatting with your computer. It's a bit like a doorman telling you who is knocking at the door. If someone strange tries to get in, you'll know right away!
Easy to use and super useful for avoiding intruders. To try !
Blackhats can take control of some PCzombies, how can we tell them apart from a botnet?
Because my PC has been doing tons of updates for 1 month, for 3 months it has been running when it is inactive and yesterday, the mouse pointer was moving on its own then disappeared, I had to restart the PC with the keyboard and a little later my headphones was playing music for no apparent reason.
Hi Ahmed
thank you for sharing your method
on the other hand, how did you recognize that the “telnet” client was spyware? Because of the local port, the protocol, its address or simply because the other processes have the same name globally?
Ok but how to recognize “exotic” names?
Because in that case I wouldn't have guessed that telnet and nc was malicious :/
Why isn't isass.exe?
In short, you have to know what.
c’est vieux comme article ça ! pq le redater du 15/03/14 !!!
So that new visitors and blog subscribers benefit!
do you know if this kind of intrusion is common on ubuntu?
Ubuntu is a Linux distribution.
Linux is just like Windows or MacOS X contains vulnerabilities that can be exploited by hackers. Linux is therefore also sensitive to this kind of intrusion, just like Windows.
can you tell us the normal ports for use in the system?
Quite simply because backdoors need to open one or more doors to listen. It is through this activity that we can spot them, especially if the open ports are unusual or have no reason to be open at this time. How about the example of netcat which is listening on port 8888!!
And how did you know it's a backdoor??
My blog : http://inf0mag.blogspot.com
Quite simply because backdoors need to open one or more doors to listen. It is through this activity that we can spot them, especially if the open ports are unusual or have no reason to be open at this time, such as the example of the netcat backdoor which is listening on Port 8888!!
The explanation is really very basic, and what is the local port that is supposed to appear. In the process, how to know if we are hacked.
In fact, you must first close all the utilities that are supposed to be connected to the internet (browser, torrent client, etc.) and only then launch the detection utility, if despite the fact that all applications are closed, unusual connections appear other than local, then it is possible, I mean possible that you are infected, the best thing is still to ask confirmation from a friend who knows a little about it.