1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Using Logs to Identify Trojans

Discussion in 'Tomato Firmware' started by TomatoFan32, Apr 26, 2014.

  1. TomatoFan32

    TomatoFan32 Network Newbie Member


    I have the original 1.28 version (from polarcloud) on a WRT54GL.

    I want to use the logs to analyze the outgoing communication to try and identify trojans on my PCs (if any). I assume that if I see outgoing communication to an unknown source my setup is infected.

    I set the outbound logging to both and just started scanning the log.
    Any advice on how to use this approach / config the logging?

  2. EOC_Jason

    EOC_Jason Networkin' Nut Member

    You could just as easily use wireshark on your PC to see the realtime network traffic...

Share This Page