Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 30 Nov 2000 08:28:32 -0700 (MST)
From:      Travis {RapidSupport} <traviso@RapidNet.com>
To:        freebsd-isp@FreeBSD.ORG, freebsd-security@FreeBSD.ORG
Subject:   Re: Danger Ports
Message-ID:  <Pine.BSF.4.21.0011300805330.83526-100000@rapidnet.com>
In-Reply-To: <Pine.BSF.4.21.0011292044170.36849-100000@flux.c-zone.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 29 Nov 2000, Dan Babb wrote:

> I am referring to the Back Orifice, Trinoo server ports, etc. Where can I
> get my hands on a list of those port #'s? or are there any utilities that
> act as those servers and log all attempts in hopes of catching those users
> who will no doubt try and take advantage of an open system?

	Probably the best thing for exactly what you are describing is
called SNORT it's a light weight intrusion detection software called SNORT
which you can get at:

	http://www.snort.org

	I can identify exactly what you are referring to in my logs.  I
also use an ipf firewall to block that which I ID with the IDS software.

	Here is a snippet of actual logs from snort on my machine:

[begin log snippet]
[**] Netbus/GabanBus [**]
09/20-21:11:08.683624 *.*.*.*:1891 -> *.*.*.*:12345
TCP TTL:64 TOS:0x0 ID:60113  DF
S***** Seq: 0x750B7F5F   Ack: 0x0   Win: 0x4000
TCP Options => MSS: 1460 

[**] Traceroute ICMP [**]
09/20-22:26:12.133438 204.178.16.36 -> *.*.*.*
ICMP TTL:1 TOS:0x0 ID:47254 
ID:3699   Seq:13803  ECHO

[**] SYN FIN Scan [**]
10/01-22:18:16.531398 203.41.93.253:21 -> *.*.*.*:21
TCP TTL:28 TOS:0x0 ID:39426 
SF**** Seq: 0x205F74F   Ack: 0x55003324   Win: 0x404

[**] PCAnywhere [**]
10/02-17:45:14.656264 *.*.*.*:1030 -> *.*.*.*:22
UDP TTL:125 TOS:0x0 ID:16896 
Len: 10

[**] Backdoor-31337-shell [**]
11/20-16:43:17.064386 *.*.*.*:2286 -> *.*.*.*:31337
TCP TTL:64 TOS:0x0 ID:57979  DF
S***** Seq: 0xDDD33B02   Ack: 0x0   Win: 0x4000
TCP Options => MSS: 1460 
---
[end log snippet]

	As you can see I have *'d out the destination IP's (my
servers) and some of the attackers IP's.  While it creates these quick
fingerprints of the attack it also holds more information on a per IP
basis.

	Personally - I don't always have time to dig through the logs so I
use "snort snarf" which takes the logs and creates a very nice web
interface for tracking attacks and trends.  Snort Snarf can be downloaded
from the Snort website...  Oh, did I mention this is free? =)

Travis

/*
-=[ Travis Ogden ]-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
RapidNet Admin Team   "Courage is not defined by those who
Phone#: 605.341.3283   fought and did not fall, but by those
ICQ#:	30220771       who fought, fell, and rose again."

Mail: 	traviso@RapidNet.com		Fax#:	605.348.1031
Web:	www.RapidNet.com/~traviso	800#: 	800.763.2525	

ATTENTION! "RapidNet has moved to 330 Knollwood Drive, 
Rapid City, SD 57701."
-=-=-=-=-=-=-=-=-=-=-=-=-=-[ traviso@rapidnet.com ]=-=-=-=-=
*/



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0011300805330.83526-100000>