What is this? Dance lessons for minefield inhabitants?
Wipe the system!
Malwarebytes Anti-Rootkit
Combofix can remove some rootkits too.
Kaspersky's TDSSKiller (only removes the TDSS rootkit variants)
Roguekiller (not entire for rootkits, but also good)
What is this? Dance lessons for minefield inhabitants?
Wipe the system!
If you are talking normal malware AND this is a home system I disagree. If we are talking about a rootkit, I agree you can not trust the system is secure anymore short of Dbaning (nuking) it.
OK, I'm the OP. I understand why you guys are saying nuke your system, but I'm also a work-for-myself consultant and it takes DAYS to rebuild my system (for which I can't charge a client, btw).
I asked this question because sometimes I get some "odd" behavior on some system in my home LAN, and I like to rule out an infection. Part of that process is running some rootkit detectors. (I haven't had a actual rootkit yet but ...)
But if guys here don't trust these tools, then they are useless. And then what do you do? DBAN and rebuild your system every day?
There has to be some middle ground where you (1) practice safe computing online, (2) have a reputable security suite on your system, (3) supplement the suite with your own handpicked tools.
Yes? No?
Well, that is obviously a different scenario. The threat title reads like you know you got a rootkit. "Odd behavior" can be anything: misconfigured/buggy software, bad hardware, user error...I asked this question because sometimes I get some "odd" behavior on some system in my home LAN, and I like to rule out an infection.
Why would it take days to rebuild the system?OK, I'm the OP. I understand why you guys are saying nuke your system, but I'm also a work-for-myself consultant and it takes DAYS to rebuild my system (for which I can't charge a client, btw).
OK, I'm the OP. I understand why you guys are saying nuke your system, but I'm also a work-for-myself consultant and it takes DAYS to rebuild my system (for which I can't charge a client, btw).
What the fuck am I reading? LOL.
You work for other people but because you can't charge _them_ to keep _your_ environment clean, you just keep using a buggy/compromised/WTFever system?
You can't be serious.
Well, that is obviously a different scenario. The threat title reads like you know you got a rootkit. "Odd behavior" can be anything: misconfigured/buggy software, bad hardware, user error...
Why would it take days to rebuild the system?
You really ought to have a disk image ready, especially if it's your work machine. It typically isn't a question IF your system breaks, just WHEN.
As a consultant, you may have sensitive client information and/or data on your system. So if you suspect foul play, you should definitely nuke the system!
That's because rootkits can be damn hard to identify.The reasn I was asking about rootkits is that the standard secuity suites don't seem to do a very good job in this area.
All nice, but you can't know when you got the rootkit and even if you did, if you just rolled back your system to a prior state, there's no way of knowing if that actually killed the rootkit (I suspect it would not).I use Retrospect for backup, which allows me to maintain version control. I do a fresh backup every year for my OS/Apps and DATA, and a monthly backup for "transactional" backup like Outlook or financial records.
Yes I am serious, and I kind of resent your tone here.
That's because rootkits can be damn hard to identify.
So if you suspect you have one, you have to nuke the system to make sure. Having you data on another drive doesn't help you out here. If you had a rootkit, its purpose is probably not just to make your system behave funny, but possibly to scan your disks and transmit files that look promising. Which could be really bad for you, depending on what you're consulting on and for whom.
All nice, but you can't know when you got the rootkit and even if you did, if you just rolled back your system to a prior state, there's no way of knowing if that actually killed the rootkit (I suspect it would not).
When I said disk image, I meant what devman said: clean install of windows, get all the updates, install your favorite software, update that, configure it and THEN make a disk image of your system. So next time something goes wrong, you can nuke the system and install that image in under one hour.
If you value customer data less than the cash you can milk from these poor souls who think they hired a responsible pro, then I have no sympathy for you.
Sorry but no one in the industry cares that much. If they do they're not making money or staying in business. Or value their own time.
(or they do care, but they can't because it's cost prohibitive)
Did you read the post he was responding to? The OP was complaining that he couldn't charge a customer directly for the cost of fixing the OP's own computer. Thats a typical operational expense. If I break a tool out in the field, I don't charge the customer for a new one.
Continuing to use a potentially compromised computer to work on client's machines is an ethical violation.