Security Incidents mailing list archives

RE: Syn probes at port 100008


From: Dave Elfering <elfering () wernerlogistics com>
Date: Tue, 15 May 2001 14:00:23 -0500

I just ran a big, hairy grep on several months of Checkpoint logs.

What I think I'm seeing is that Firewall-1 seems to pick port 10008 a lot as
the translated source port "xlatesport 10008"

Maybe this is a redherring, I dunno since nothing comes to mind as to why
this might be relevant. 

It did strike me odd to find that as a frequent translate source port. Then
again if you're into numerology you can make strange arguments about the
assassination of Lincoln :)

-Dave


-----Original Message-----
From: Lance Spitzner [mailto:lance () honeynet org]
Sent: Tuesday, May 15, 2001 9:39 AM
To: Henri J. Schlereth
Cc: incidents () securityfocus com
Subject: Re: Syn probes at port 100008


On Tue, 15 May 2001, Henri J. Schlereth wrote:

 I am starting to see syn probes on port 10008. I cant seem to find
 any references as to what uses that port. I know I am not.

 05-14-2001  Mo  11:47:54  209.205.30.10                   10008
 05-14-2001  Mo  14:11:25  210.206.177.138                 10008
 05-14-2001  Mo  19:46:48  211.21.142.65                   10008
 05-15-2001  Tu  00:26:48  194.102.188.134                 10008

Our Honeynet recently picked up these scans.  Below is the snort capture.
Based on passive OS fingerprinting, it appears the source system is Linux.
We received port 10008 scans from three different systems, all source
signatures
were the same.  This implies the scan may be for Unix based vulnerabilities
or backdoor.

lance

-*> Snort! <*-
Version 1.7
By Martin Roesch (roesch () clark net, www.snort.org)

        --== Initializing Snort ==--
TCPDUMP file reading mode.
Reading network traffic from "snort-0514 () 0005 log" file.
snaplen = 1514

        --== Initialization Complete ==--
05/14-04:45:01.954393 200.204.170.212:2394 -> 172.16.1.102:10008
TCP TTL:48 TOS:0x0 ID:28181 IpLen:20 DgmLen:60 DF
******S* Seq: 0x19C1BA52  Ack: 0x0  Win: 0x7D78  TcpLen: 40
TCP Options (5) => MSS: 1460 SackOK TS: 42499815 0 NOP WS: 0

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

05/14-04:45:01.961927 172.16.1.102:10008 -> 200.204.170.212:2394
TCP TTL:46 TOS:0x0 ID:32915 IpLen:20 DgmLen:40 DF
***A*R** Seq: 0x0  Ack: 0x19C1BA53  Win: 0x0  TcpLen: 20

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

05/14-04:45:01.967340 200.204.170.212:2396 -> 172.16.1.104:10008
TCP TTL:48 TOS:0x0 ID:28183 IpLen:20 DgmLen:60 DF
******S* Seq: 0x19A0AB8D  Ack: 0x0  Win: 0x7D78  TcpLen: 40
TCP Options (5) => MSS: 1460 SackOK TS: 42499815 0 NOP WS: 0

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

05/14-04:45:01.970390 172.16.1.104:10008 -> 200.204.170.212:2396
TCP TTL:46 TOS:0x0 ID:32916 IpLen:20 DgmLen:40 DF
***A*R** Seq: 0x0  Ack: 0x19A0AB8E  Win: 0x0  TcpLen: 20

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

05/14-04:45:01.979359 200.204.170.212:2398 -> 172.16.1.106:10008
TCP TTL:48 TOS:0x0 ID:28185 IpLen:20 DgmLen:60 DF
******S* Seq: 0x19CA6878  Ack: 0x0  Win: 0x7D78  TcpLen: 40
TCP Options (5) => MSS: 1460 SackOK TS: 42499815 0 NOP WS: 0



Current thread: