Home page logo

basics logo Security Basics mailing list archives

Re: Serious Offshore Probes Detected & Defeated
From: "David J. Bianco" <david () vorant com>
Date: Mon, 01 Oct 2007 14:49:01 -0400

Hello, Jeffrey.  I don't wish to sound too skeptical about your findings,
but I have a few questions about your findings.  I have inserted them
into the text below.

jes1 () comcast net wrote:
(1) There are seven active sites in China: - CNCGROUP Heilongjiang province network -Mudanjiang  - ChinaNet Guangdong Province Network - Guangzhou  - Data Communication Division - Beijing  - CNCGROUP Heilongjiang province network - Mudanjiang  - CNC Group Hebei province network - Hebei - CHINANET Shanxi(SN) province network - Beijing  - Data Communication Division, Network Center of Fast China Shipbuilding institute - Zhenjiang

Of the seven sites listed above, has attempted the most intense attack, installing Remote Access Java 
Scripts as defined in my previous e-mail on detecting the China attack methods.  None of the seven sites above were 
successful against Shadow. All probes/attacks were detected and stopped.

Could you elaborate on the types of attacks you're seeing?  "Installing
Remote Access Java Scripts" is not quite as useful without knowing how they
are attempting to do that.  Was there a specific exploit they tried to
use to deface your website, or a certain misconfiguration they were
taking advantage of?

(2) Shadow has been detecting and securing our web site/network from 5 simultaneous probes/attacks from China, each 
from a different city in China.

Sorry, but five doesn't seem to be a very high number.  I see lots of
probes every day, much more than five.  Also, can I assume that these
look more like automated, mass attacks rather than something more targeted
to the organization?

(3) We have been able to determine, the probes/attacks are evolving to a very advanced methodology, which no longer 
depends on a successful ping (ICMP), and now start with a defined IP address, and cycles through every possible IP 
combination within the IP address range.  As an example, a probe starts with "", launches a UDP packet 
and/or TCP packet, then goes to "", then "", so forth and so on.

I assume that you're not trying to say that you've just discovered how
port sweeps work.  Most mass attack tools work the way you describe.
If this is the state of your art, could that explain the low number for
#2?  Or is there something else here that your writeup didn't really
make clear?

(4) The other probes/attacks were from the following: - Hanaro Telecom Co. - South Korea - Seocho  - CPSOFT - Australia - No City Identified    - Easynet Belgium, Cypres - Belgium - Brussel   - Shaw Communications - Canada - No City Identified

Again, without some information about what probes and attacks you saw
from these addresses, I have no way to evaluate the seriousness of
the activity.  Would you care to elaborate?


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]