× Welcome to SGCyberSecurity forum!

Feel free to discuss any topics relating to cybersecurity with the rest of the security community in this forum.

Topic-icon Is my computer being used for DDoS attack?

55 years 1 week ago #2531 by o_34jonston

Good question! If an attacker really want to use your computer to a botnet DDoS attack, it's quite sophisticated. You can run some commands to check if your traffic is sending/receiving any packets from unknown source.

Please Log in or Create an account to join the conversation.

55 years 1 week ago #2532 by o_Delph Loh

well.. here is a link... but main thing is try not to get infected in the 1st place....

security.stackexchange.com/questions/124...et-based-ddos-attack

if you are bad with command ... you can use wireshark to sniff the traffic in and out of your network.. its a user friendly app.. but you need to know what type of traffic you are looking for

Please Log in or Create an account to join the conversation.

55 years 1 week ago #2533 by o_34jonston

@Delph Loh ?ÿuseful link but it's pretty technical esp. for the average individuals. let's say i use wireshark and detected there's inbound/outbound traffic from suspicious sources, so what do I do? Can I kill and stop it?

Please Log in or Create an account to join the conversation.

55 years 1 week ago #2537 by o_Kenneth Lee

Unless you can identify and reliably remove the source of why such suspicious traffic is there in the first place, killing the process will only stop it for a while. They are likely to be revived again. And if you are able to identify it, it will also mean you have more serious problems to worry about as your devices are already compromised.

Please Log in or Create an account to join the conversation.

55 years 1 week ago #2538 by o_living soul

My thoughts are that if hackers managed to compromise ur computer and any other internet-connected devices, chances r that it's beyond repair. meaning you can't do much to remove that malware, not sure if the current top 10 antivirus can remove them as it may be hidden deep down in your comp. better to reformat ur comp.

Please Log in or Create an account to join the conversation.

55 years 1 week ago #2542 by o_paulsng33

just imagine every individual has at least a mobile device, a personal computer and in each home, there's at least a wifi router, Smart TV, webcams, etc.. All these are not new products that springs up overnight. The key thing to note is that manufacturers generally do not factor in security in their design. We are not talking about a Cisco firewall, router where it's their core business in designing security products. But for the rest, who cares and it takes lots of effort in designing it in their firmware and they have to keep constantly updating their firmware to keep pace with new threats.

Please Log in or Create an account to join the conversation.