Security Incidents mailing list archives

Re: Port 111 Traffic


From: Tim Brown <tim.brown () ncmail net>
Date: Tue, 11 Dec 2001 16:20:36 -0500

To clarify- the zeros in the destination address are actually there. Only the first two octets of the source have been changed to nnn.nnn.

Tim Brown wrote:

This information was generated by snoop on Solaris. Any ideas? See bottom of message for a single verbose packet capture.
nnn.nnn = the not so innocent IP.

nnn.nnn.213.13 -> 0.47.0.205 TCP D=111 S=33399 Syn Seq=2559250306 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.204 TCP D=111 S=33398 Syn Seq=2559160482 Len=0 Win=8760 nnn.nnn.213.11 -> 0.181.0.37 TCP D=111 S=59773 Rst Seq=2178778586 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.207 TCP D=111 S=33401 Syn Seq=2559361718 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.208 TCP D=111 S=33402 Syn Seq=2559390097 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.209 TCP D=111 S=33403 Syn Seq=2559476442 Len=0 Win=8760 nnn.nnn.213.11 -> 0.181.0.38 TCP D=111 S=59774 Rst Seq=2178892699 Len=0 Win=8760 nnn.nnn.213.11 -> 0.181.0.42 TCP D=111 S=59778 Rst Seq=2179194372 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.215 TCP D=111 S=33409 Syn Seq=2559700481 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.214 TCP D=111 S=33408 Syn Seq=2559656916 Len=0 Win=8760 nnn.nnn.213.11 -> 0.181.0.43 TCP D=111 S=59779 Rst Seq=2179223246 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.216 TCP D=111 S=33410 Syn Seq=2559772250 Len=0 Win=8760 nnn.nnn.213.11 -> 0.181.0.44 TCP D=111 S=59780 Rst Seq=2179342238 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.218 TCP D=111 S=33412 Syn Seq=2559854823 Len=0 Win=8760 nnn.nnn.213.11 -> 0.181.0.45 TCP D=111 S=59781 Rst Seq=2179387236 Len=0 Win=8760 nnn.nnn.213.11 -> 0.181.0.46 TCP D=111 S=59782 Rst Seq=2179459169 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.219 TCP D=111 S=33413 Syn Seq=2559861661 Len=0 Win=8760 nnn.nnn.213.11 -> 0.181.0.48 TCP D=111 S=59784 Rst Seq=2179596754 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.221 TCP D=111 S=33415 Syn Seq=2559922066 Len=0 Win=8760 nnn.nnn.213.11 -> 0.181.0.50 TCP D=111 S=59786 Rst Seq=2179755204 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.226 TCP D=111 S=33420 Syn Seq=2560346165 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.227 TCP D=111 S=33421 Syn Seq=2560403095 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.235 TCP D=111 S=33429 Syn Seq=2561000060 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.233 TCP D=111 S=33427 Syn Seq=2560897528 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.237 TCP D=111 S=33431 Syn Seq=2561153509 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.238 TCP D=111 S=33432 Syn Seq=2561195283 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.240 TCP D=111 S=33434 Syn Seq=2561332283 Len=0 Win=8760 nnn.nnn.213.13 -> 0.47.0.242 TCP D=111 S=33436 Syn Seq=2561468508 Len=0 Win=8760 nnn.nnn.213.32 -> 0.123.0.55 TCP D=111 S=56202 Rst Seq=240026718 Len=0 Win=8760 nnn.nnn.213.32 -> 0.123.0.57 TCP D=111 S=56204 Rst Seq=240210073 Len=0 Win=8760 nnn.nnn.213.32 -> 0.123.0.58 TCP D=111 S=56205 Rst Seq=240300794 Len=0 Win=8760 nnn.nnn.213.32 -> 0.123.0.59 TCP D=111 S=56206 Rst Seq=240409147 Len=0 Win=8760 nnn.nnn.213.32 -> 0.123.0.60 TCP D=111 S=56207 Rst Seq=240429542 Len=0 Win=8760 nnn.nnn.213.32 -> 0.123.0.61 TCP D=111 S=56208 Rst Seq=240433968 Len=0 Win=8760 nnn.nnn.213.32 -> 0.123.0.62 TCP D=111 S=56209 Rst Seq=240477791 Len=0 Win=8760 nnn.nnn.213.32 -> 0.123.0.65 TCP D=111 S=56212 Rst Seq=240763588 Len=0 Win=8760 nnn.nnn.213.32 -> 0.123.0.72 TCP D=111 S=56219 Rst Seq=241169371 Len=0 Win=8760

Verbose Output of one packet:

ETHER:  ----- Ether Header -----
ETHER: ETHER:  Packet 6 arrived at 14:48:18.30
ETHER:  Packet size = 60 bytes
ETHER:  Destination = 0:10:7:dc:38:60,
ETHER:  Source      = 0:e0:3n:nn:nn:nn,
ETHER:  Ethertype = 0800 (IP)
ETHER: IP:   ----- IP Header -----
IP:  IP:   Version = 4
IP:   Header length = 20 bytes
IP:   Type of service = 0x00
IP:         xxx. .... = 0 (precedence)
IP:         ...0 .... = normal delay
IP:         .... 0... = normal throughput
IP:         .... .0.. = normal reliability
IP:   Total length = 40 bytes
IP:   Identification = 7932
IP:   Flags = 0x4
IP:         .1.. .... = do not fragment
IP:         ..0. .... = last fragment
IP:   Fragment offset = 0 bytes
IP:   Time to live = 251 seconds/hops
IP:   Protocol = 6 (TCP)
IP:   Header checksum = f5c2
IP:   Source address = nnn.nnn.213.11, nnn.nnn.213.11
IP:   Destination address = 0.57.0.36, 0.57.0.36
IP:   No options
IP:  TCP:  ----- TCP Header -----
TCP: TCP:  Source port = 33596
TCP:  Destination port = 111
TCP:  Sequence number = 3073870737
TCP:  Acknowledgement number = 0
TCP:  Data offset = 20 bytes
TCP:  Flags = 0x04
TCP:        ..0. .... = No urgent pointer
TCP:        ...0 .... = No acknowledgement
TCP:        .... 0... = No push
TCP:        .... .1.. = Reset
TCP:        .... ..0. = No Syn
TCP:        .... ...0 = No Fin
TCP:  Window = 8760
TCP:  Checksum = 0x5c23
TCP:  Urgent pointer = 0
TCP:  No options
TCP:


--

Tim





----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com


Current thread: