Using Logs to Identify Trojans

Discussion in 'Tomato Firmware' started by TomatoFan32, Apr 26, 2014.

  1. TomatoFan32

    TomatoFan32 Network Newbie Member

    Hi,

    I have the original 1.28 version (from polarcloud) on a WRT54GL.

    I want to use the logs to analyze the outgoing communication to try and identify trojans on my PCs (if any). I assume that if I see outgoing communication to an unknown source my setup is infected.

    I set the outbound logging to both and just started scanning the log.
    Any advice on how to use this approach / config the logging?

    Thanks!
     
  2. EOC_Jason

    EOC_Jason Networkin' Nut Member

    You could just as easily use wireshark on your PC to see the realtime network traffic...
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice