Detect Backdoor with Colasoft Capsa

Discussion in 'Capsa Network Analyzer' started by Colasoft, Dec 14, 2007.

Thread Status:
Not open for further replies.
  1. Colasoft

    Colasoft Colasoft Support

    Dec 6, 2007
    Colasoft Co., Ltd.
    What is a backdoor?

    A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected, the backdoor may take the form of an installed program, or could be a modification to an existing program or hardware device. It hides in the computer, scans existing loopholes, opens corresponding ports, as well as modifies system registration files.

    Backdoor will not duplicate or actively spread itself. It will only open a certain port through which a remote computer in the network can control the infected computer. Generally the backdoor will not influence normal communication of the network, so firewalls or IDS can hardly detect its existence.

    Is my network infected with a backdoor?

    According to statistics, most of the backdoors work under port 31337, 31335, 27444, 27665, 20034, 9704, 6063, 5999, 5910, 5432, 2049, 1433, 444, and 137-139. So whether there is communication through these ports in the network determines whether the network is infected with a backdoor.

    Note: we are not able to list all the ports since the backdoor develops so fast. If you find other ports, just add them in the monitoring list.

    Let’s check whether there is a host infected with backdoor in the network by using Colasoft Capsa to monitor those ports.

    Step1. Open Colasoft Capsa and click “Filter” button on the toolbar to open filter dialog box.

    Step2. Click “Add” button in the dialog box and configure settings as shown in Figure 1:


    (Figure1. Backdoor Filter)

    Input “31337;31335;27444;27665;20034;9704;6063;5999;5910;5432;2049;1433;444;137;138;139;” in the box.

    Step3. Click “OK” to enable this filter as shown in Figure 2


    (Figure2. Enable Filter)

    Step 4. Start capturing, if any packet is captured by Colasoft Capsa, it indicates the network MIGHT be infected with a backdoor.

    Step 5 Check the source and purpose of the packet and make a deep analysis, then isolate the infected host to ensure network security.

    (Figure 5 View Packet Information)
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.