Security Incidents mailing list archives
Re: Interesting Logs to port 8941
From: Ryan Yagatich <ryany () pantek com>
Date: Mon, 21 Oct 2002 09:34:12 -0400 (EDT)
erik,
I first saw your response and was thinking that you were 100%
correct and that someone was SYN flooding my box, however what makes this
unique is the following:
1) source IP's are erratically different
2) the times of each occurance are very spaced out
3) the packet size/window vary as well
4) the target address (mine) is dynamic and had only been up about
60 minutes before the connection attempts
5) it only occured on that one day
6) the target address is on a dialup connection with no real
services behind it.
To go a little bit further with my reasoning, starting at the bottom and
moving up:
6 - there are really only a few purposes in which an attacker
could desire to attack a dialup connection (in my experience that is)
a) the system was randomly compromised by either a virus
or some form of 'i accidentally opened that attachment and now the network
is down'. and was sending out initial requests in which they were trying
to respond.
b) the address that i was using had been in use by another
person whom had been flooded off the network or just disconnected.
c) it was a randomly selected IP address that a DDoS was
to be performed on...
5 - since it only occured on the one day it makes me almost think
that it could have been an attempt at a DDoS to my system or that the
source addresses were not really what they claimed to be
4 - that 60 minute period only occured since my connection was
running at a smooth 9600 baud and IRC couldn't keep up with it
3 - this makes me think that they are either different platforms
(see below) or it is a subvert way of deferring the target's thoughts to
hide what is really happening.
2 - if this were a DDoS or any SYN flood attempt, 3 SYN packets
going in is hardly enough to bring down a line, even that of a dialup
connection at 9600 baud. Since the timestamps between each occurance are
also spread out a DDoS can _almost_ be ignored as they are not occuring in
a quick enough fashion to actually bring down the line.
1 - it was somewhat mentioned above, but if i were a kiddie that
was attempting to SYN flood someone, either from one host or many, i would
have made sure that all of the systems i was working on were attacking at
the same time. since the time stamps differ (#2) and that the source
addresses differ, this plays a big factor.
Now for some converse notes....
It was mentioned as a big part that 1) this is a dialup line, and 2) it
was only connecting at 9600. This could mean that the packets weren't even
getting to my system at all and could have been arriving at a much heavier
frequency.
I mentioned that all of the systems could have been running on different
platforms i have run a few scans on the targetted systems and have found
that many appear to be MS Windows 2000 systems with some common ports >
1024 open (none of which being the targetted port might I add), and that
other systems are different platforms or are protected by different
platforms. ( i've since then added a directory called scans/ that has all
of the output )
So, the question really still remains as it was and makes me wonder even
more:
why all the different source addresses?
why all the different platforms / source system types?
why only 3 connection attempts before stopping?
why the large time scale between hits?
why only that one day and never again?
If you, or anyone else can answer this, please do for I am at a loss.
Thanks,
Ryan Yagatich <support () pantek com>
Pantek, Incorporated
(877) LINUX-FIX - (440) 519-1802
===================================
E8 35 42 82 32 4E 63 6D B5 FF 7B 8A
6E DE D5 1F D0 2C 06 C6 8D 3D B6 95
===================================
Programming today is a race between
software engineers striving to
build bigger and better idiot-proof
programs and the universe trying to
produce bigger and better idiots.
So far, the universe is winning.
On Thu, 10 Oct 2002 eschott () eXceededucation com wrote:
It looks like an attempt at a TCP SYN flood. However, I would recommend strongly that you use snoop, tcpdump or netcat to monitor the traffic and see if your host responds with a SYN ACK packet and never receives an ACK from the originator. If that is the case, then you very likely are seeing a TCP SYN flood attempt. Erik J. Schott Technical Instructor eXceed Education, Inc. 379 Thornall St. 4th Floor Edison, NJ 08837 Voice: 732.767.1641 Fax:732.767.0746 eschott () exceededucation com
---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- Interesting Logs to port 8941 Ryan Yagatich (Oct 09)
- <Possible follow-ups>
- Re: Interesting Logs to port 8941 Ryan Yagatich (Oct 30)
