From owner-freebsd-security Fri Nov 2 5:13:35 2001 Delivered-To: freebsd-security@freebsd.org Received: from pa169.kurdwanowa.sdi.tpnet.pl (pa169.kurdwanowa.sdi.tpnet.pl [213.77.148.169]) by hub.freebsd.org (Postfix) with ESMTP id AB7BB37B405 for ; Fri, 2 Nov 2001 05:13:31 -0800 (PST) Received: from velvet.zaraska.dhs.org (velvet.zaraska.dhs.org [192.168.11.2]) by pa169.kurdwanowa.sdi.tpnet.pl (Postfix) with ESMTP id 56FFA1DA7; Fri, 2 Nov 2001 14:13:23 +0100 (CET) Received: from velvet.zaraska.dhs.org (velvet.zaraska.dhs.org [127.0.0.1]) by velvet.zaraska.dhs.org (8.11.2/8.11.2) with SMTP id fA2DD3f17419; Fri, 2 Nov 2001 14:13:03 +0100 Date: Fri, 2 Nov 2001 14:13:03 +0100 From: Krzysztof Zaraska To: freebsd-security@freebsd.org Subject: Re: SubSeven trojan horse Message-Id: <20011102141303.6b856e15.kzaraska@student.uci.agh.edu.pl> Organization: University Of Mining And Metallurgy X-Mailer: Sylpheed version 0.6.2 (GTK+ 1.2.9; i586-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org On Fri, 2 Nov 2001 07:53:37 -0500 (EST) Ralph Huntington wrote: > Interresting. One ouwld be able to see the client running if that were the > case, yes? I think so. You should be able to see client process on your machine, or more interestingly, packets from your machine to SubSeven's port on remote network. According to the list I have (don't remember the source) it's 1243, 6711, 6776 TCP. You should do your own search on the topic (I don't know if the list I have is reliable). Anyhow, snort or tcpdump will help you here. > > As of spoofed attack... IIRC, BackOrifice used UDP, SubSeven may do so > > also, so sending spoofing requests should be possible. > > But a probe could be spoofed, could it not? Since as I've just learned SubSeven (probably) uses TCP spoofing is made more difficult, thus spoofed portscan / probe is more probable then spoofed TCP session... The problem is that they didn't tell you if they saw just a single SYN packet or complete handshake and following session. Krzysztof To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message