15th August, 2003
Introduction BlastBack works by sitting in the background and waiting for connection attempts to be made to a specified port. Upon contact, it obtains the IP address of the infected remote machine and then closes the port. Finally, it dispatches a message (via the Messenger service in Windows) to the IP it obtained letting the computer user know that their PC is infected with the MSBlast worm and gives them a website URL to visit for further information.
Using BlastBack requires having a hardware router connected to your PC. This does two things:
The Windows' Messenger service also needs to be enable (which it is by default) in-order for BlastBack to reply to the infected machines. Your PC must be able to send Messenger notices out of your local area network and onto the internet. You can test this by typing NET SEND [ip] [message] via the command prompt, replacing the IP with the IP address of a friend that is capable of receiving Messenger notices. Once the hardware side of things has been set up, you are ready to go. Run BlastBack.exe and you should start getting attempted connections; this depends on how "infested" your "surrounding area" of the internet is. Logically, the amount of connection attempts should diminish over time. EG. This application should not be required in the next year or two. For the detection and removal of the MSBlast worm, please go into the Detect section of the software; everything is fully explained within that section of the software itself. There are also a couple of settings relating to the detection available in the Settings section. The background scanner is feature of BlastBack that scans the system's process list for detection of the worm. If it is found, you are warned and advised to immediately cleanse your system via the Detect tab.
Other Uses BlastBack's primary MSBlast use requires a router so it is able to listen on port 135 simutaneously with Windows itself, although technically it isn't listening on port 135, but having port 135 attempts forwarded to port 10000. This also keeps your PC safe as no port 135 connection attempts will ever make it to port 135 on your PC. Please Note: BlastBack was originally called MasterBlaster, but has since had its named changed.
15/08/2003, v1.20 Added detection and removal of W32.Blaster.B.Worm and W32.Blaster.C.Worm variants. Added Hit Count column to the logging list to help reduce duplicate IP hits. Added optional sound effects. Changed default message sent to infected PCs. Various minor changes.
15/08/2003, v1.10
14/08/2003, v1.00
Credits |