Security Incidents mailing list archives

Re: Tracking down random ICMP


From: Jean-Baptiste Marchand <jbm.lists () gmail com>
Date: Fri, 9 Feb 2007 01:17:01 +0100

On Wed, Jan 24, 2007 at 02:05:55PM +1300, Bojan Zdrnja wrote:

So, in other words, for the original poster: use ListDLLs
(http://www.microsoft.com/technet/sysinternals/ProcessesAndThreads/ListDlls.mspx)
which will list all processes and show you DLLs that each of them is
using. Then go through that list and eliminate all processes that are
not using Iphlpapi.dll. Now you will have a list of processes that
need to be examined further.

Even simpler, provided the Windows system is running at least Windows
XP, you can use the tasklist program with the /m option to directly find
out all the processes that have Iphlpapi.dll loaded.

Because Iphlpapi.dll is a DLL that contains common network functions,
tasklist will certainly list several processes with the DLL loaded.

You can then try to suspend one by one each process with PsSuspend from
Sysinternals and see if the ICMP activity stops or not.

If the system is receiving ICMP packets in response to the sent traffic
and if the Windows firewall is configured to log dropped traffic, you
can easily verify if suspending a process stops the ICMP traffic by
"tailing" Pfirewall.log or looking at the file size.

Both tasklist and PsSuspend work on remote systems (MSRPC over SMB is
used in that case, requires 139/tcp or 445/tcp to the remote system),
provided you have administrator credentials. Typically, you would first
establish an SMB session with net use using administrator credentials.

Jean-Baptiste Marchand


Current thread: