<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using logging &amp; packet-capture to locate virus infected pc in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740467#M534396</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey you are getting closer &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont think you can block traffic based on a MAC. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How about going to the DHCP server AP is using for the address assigment and check the DHCP Bindings? That way you can map the IP address to MAC. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 05 Aug 2011 16:15:39 GMT</pubDate>
    <dc:creator>raga.fusionet</dc:creator>
    <dc:date>2011-08-05T16:15:39Z</dc:date>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740452#M534332</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ATT notified my company we have a virus infected pc on one our networks which sits behind a Cisco ASA 5505 running 7.2(4). &lt;/P&gt;&lt;P&gt;The set up is a basic inside/outside NAT configuration. They gave us the destination ip address and port which the our pc is contacting.&amp;nbsp; I have been tasked to track down the infected pc.&amp;nbsp; I created the following access-list and applied to the inside interface: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list VIRUS extended permit TCP ANY host x.x.x.x EQ YYYYY log debugging interval 600 &lt;/P&gt;&lt;P&gt;access-group VIRUS in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I enable logging to the console whose output did not list the IP address of the infected pc, only the ip address of the DNS servers we were using. I then used the following capture commands to try locate the internal ip address of the infected pc:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture in-cap interface inside access-list VIRUS-CAP buffer 1000000 packet 1522&lt;/P&gt;&lt;P&gt;capture in-cap access-list VIRUS-CAP interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Neither step worked and the resulting console output overwhelmed the firewall in a very short period of time. Before attempting this task again, I would like to know if I am going about this the right way or if there is a better methodology?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help is greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:07:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740452#M534332</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2019-03-11T21:07:20Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740453#M534339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Douglas, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try a "show conn port xxx" or show xlate. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to spot the guy because he would have a an excessive amount of connections on that port. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also "show local-host brief" might help, you would see a host with an unsual number of embryonic connections. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raga&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 02:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740453#M534339</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-04T02:57:58Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740454#M534345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I meant show conn port yyyyy &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 03:00:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740454#M534345</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-04T03:00:53Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740455#M534354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Morning,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all your suggestions. So far no luck find the IP address or port. The commands which help the most since I know the remote computers ip address and port # is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show conn all&lt;/STRONG&gt; - shows all the inside &amp;amp; outside ip addresses and port #&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show conn protocol tcp all - &lt;/STRONG&gt;shows all the inside &amp;amp; outside TCP ip addresses and port #'s&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show local-host brief &lt;/STRONG&gt;- shows all the inside &amp;amp; outside ip addresses and port # plus the embryonic count&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions for a syslog program so I can review logs instead of watching a console all day?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 14:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740455#M534354</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-08-04T14:34:00Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740456#M534359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wouldnt rely on the destination IP your ISP gave you becuase it might change. I would use the port number instead. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now just to be clear if you do a show conn port yyy you dont get anything ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Syslog you can use Kiwi, it's pretty simple to install and use. If you wanna to try logging with an ACL use just the port number. Like I mentioned, the destinations tend to change becuase they are usually Command and Control servers used by the person that designed the virus and they keep on changing them. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just out of curiosity, what port is the virus infected pc using according to your ISP? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 14:53:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740456#M534359</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-04T14:53:06Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740457#M534364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the output I get:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ForumAP# show conn port 56164&lt;/P&gt;&lt;P&gt;223 in use, 741 most used&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing else.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 14:54:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740457#M534364</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-08-04T14:54:51Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740458#M534370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmm that looks like source port, and those tend to change to, did they give you the destination port ? The destination port is unlikely to change. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are not getting any output because there are no connections going on that port at this time. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try something like show conn port 80 and you'll see the difference. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if you do something like show conn | inc 56164&amp;nbsp; you'll probably get nothing. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 15:01:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740458#M534370</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-04T15:01:48Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740459#M534375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We were given the following info&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;destination ip 149.20.56.34 port 56164.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is all the information we were given.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 15:25:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740459#M534375</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-08-04T15:25:24Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740460#M534378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmm to be honest, its going to be hard to track it down becuase that looks like a source port, I dont think they are giving you enought info. You can still do the ACL with the syslog server but I doubt you are going to get any results. You might wanna do one line for any traffic on that port and another line for any traffic going to that destination to avoid making it way too specific. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Viruses usually scan other hosts on vulnerable ports such as 445, 139, 135 ,23&amp;nbsp; if they are worms trying to infect other users and ports like 6667,6668,6669, and 7000 if they are IRC bots. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, you might wanna do the show conn port with those ports I mentioned, maybe you get lucky and spot the guy becuase he would have an usual number of connections to lots and lots of destinations (typically sequencial destinations) or because he is using an IRC port to communicate &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 15:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740460#M534378</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-04T15:45:14Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740461#M534383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try your suggestions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 16:29:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740461#M534383</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-08-04T16:29:20Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740462#M534385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Create an object group with all your internal hosts listed within your DHCP scope or your servers. A little tedious and maybe over the top but it may help in addition to what Luis posted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network VIRUS-FINDER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;network-object host 192.168.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;network-object host 192.168.1.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;etc...&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next, create an ACL and apply access group to the inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_out permit tcp object-group VIRUS-FINDER any eq 445 &lt;/STRONG&gt;&lt;EM&gt;(or any ports mentioned by Luis)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Show access-list inside_access_out and the node with the most hits will most likely be your culprit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good Luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Aug 2011 04:09:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740462#M534385</guid>
      <dc:creator>Lee Valentin</dc:creator>
      <dc:date>2011-08-05T04:09:15Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740463#M534389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Morning,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We contacted ATT to find out if they could provide us with a little more information which is current. When I get to work, I will start working on the suggestion above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Aug 2011 11:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740463#M534389</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-08-05T11:20:22Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740464#M534391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the most current information we have received from ATT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IMPORTANT COMPUTER SAFETY NOTICE from AT&amp;amp;T Internet Services Security Center&lt;/P&gt;&lt;P&gt;- "Conficker Traffic Detected"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our investigation shows the following IP was assigned to your log-on session&lt;/P&gt;&lt;P&gt;at the indicated time and was being used to provide DNS services to a zombie&lt;/P&gt;&lt;P&gt;computer network, also known as a Botnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At Tue, 02 Aug 2011 09:38:29 +0000, your IP address was: 209.151.147.150&lt;/P&gt;&lt;P&gt;Type of infection (if known): downadup Source Port: 61863 Destination IP:&lt;/P&gt;&lt;P&gt;143.215.143.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Botnets are networks of compromised computers under the control of a hacker&lt;/P&gt;&lt;P&gt;or group of hackers.&amp;nbsp; Botnets are often used to conduct various attacks&lt;/P&gt;&lt;P&gt;ranging from denial of service attacks on websites, to spamming, click&lt;/P&gt;&lt;P&gt;fraud, and distribution of malicious software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on our data we believe the specific malware you are infected with is&lt;/P&gt;&lt;P&gt;known as "Conficker".&amp;nbsp; We recommend you check your computer(s) with the&lt;/P&gt;&lt;P&gt;following link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;==&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are in the process of setting up a syslog server running Kiwi. I will keep you posted on the details.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Aug 2011 13:27:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740464#M534391</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-08-05T13:27:29Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740465#M534393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Conficker uses a variety of the mechanisms to propagate, the latest variants even use P2P. Again the ISP is giving you a source port and that's totally useless becuase it changes in a matter of seconds or even less. Same with the destination IPs.They'll keep on changing.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think your best option would be to watch for connections on ports 445 and 139,&amp;nbsp; with the show conn port 445 command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another option would be to install nmap on your PC and scan your network, here is a post that mentions that you could nmap to detect conficker infected systems: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using the latest development version of Nmap one would run a command to scan systems for Conficker signature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;CODE&gt;nmap -PN -T4 -p139,445 -n -v --script=smb-check-vulns --script-args safe=1 [targetnetworks]&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://linuxsysadminblog.com/2009/03/scanning-for-conficker-with-nmap/"&gt;http://linuxsysadminblog.com/2009/03/scanning-for-conficker-with-nmap/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW this comes from a linux forum but you can install nmap on windows. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Aug 2011 15:13:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740465#M534393</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-05T15:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740466#M534395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quick question: On a ASA 5505 running 7.2(5) can you block a mac address? It appears we have a computer using one of our Cisco 1200 AP with just a ton of open connections:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See attached for list of open connections:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Aug 2011 16:08:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740466#M534395</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-08-05T16:08:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740467#M534396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey you are getting closer &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont think you can block traffic based on a MAC. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How about going to the DHCP server AP is using for the address assigment and check the DHCP Bindings? That way you can map the IP address to MAC. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Aug 2011 16:15:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740467#M534396</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-05T16:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740468#M534397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA 5505 hands out ip address via DHCP to the Cisco AP. If we block the computer's current ip address, it will get another ip address before we find it. We want to nuke this problem ASAP before we get shut down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Aug 2011 16:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740468#M534397</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-08-05T16:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740469#M534398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok in that case, check if the AP allows MAC filtering and ban the MAC of the PC. Depending on the AP model I think you may have the option to do it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In any case, if you just block this guy's IP with an ACL for example, I dont think the IP address will change so quickly, you are just blocking his path, not forcing him to renew his IP. The IP should remain as long as the lease is good. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you catch him &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Aug 2011 16:32:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740469#M534398</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-05T16:32:56Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740470#M534401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Douglas, were you able to catch this guy? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Aug 2011 21:38:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740470#M534401</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-09T21:38:07Z</dc:date>
    </item>
    <item>
      <title>Using logging &amp; packet-capture to locate virus infected pc</title>
      <link>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740471#M534403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not, but still working on it. Installed Kiwi Syslog to monitor network activity but that is about it. This weekend, when I have a chance, I will post more details of what I have done and plan to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Aug 2011 09:10:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-logging-packet-capture-to-locate-virus-infected-pc/m-p/1740471#M534403</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-08-12T09:10:10Z</dc:date>
    </item>
  </channel>
</rss>

