Firewall Wizards mailing list archives
Re: potential network attacks
From: "Shahryar Jahangir" <sjahangi () siac com>
Date: Thu, 13 Dec 2001 14:24:05 -0500
Daniel, Snort is a wonderful packet sniffer that I use heavily. I would give it a try. Luck. sj |--------+-----------------------> | | "Daniel | | | Handley" | | | <daniel@homep| | | age.net> | | | | | | 12/13/2001 | | | 03:41 AM | | | Please | | | respond to | | | daniel | | | | |--------+-----------------------> >-------------------------------------------------------------------------| | | | To: firewall-wizards () nfr com | | cc: (bcc: Shahryar Jahangir/SIAC) | | Subject: [fw-wiz] potential network attacks | >-------------------------------------------------------------------------| i wish to check if my network is coming under attack. in the last few days we have noticed that the incoming network traffic is usually high. our web servers are in a dmz located behind a cisco pix 515 6.1(1). the servers are nt4 iis with no outstanding items in their log files, or additional files that have been ftp'd etc on to them. they are all patched up to the hilt and virus scanned regularly. using the pdm console on the pix reveals peaks in udp traffic at the time of increased network traffic. this leads me to believe that we have been under attack from some one attempting to use the recently exposed vulnerability in w2k via IKE. to check my theory (and prove to the boss that i am doing my job) i need a packet sniffer to view the traffic entering the network. unfortunately i have no budget (or maybe a very small one) and must use the dos/windows/nt environment. i have been following the discussions recently about snort, ethereal, etc but am under pressure to have a result yesterday and so don't have time for any evaluation. can you please suggest a solution thanks in advance dan in addition does anyone know of a way to get logs (and decipher them) from the pix without using the nt syslog server that kills tcp connections when disconnected (not any good for web hosting). i intend to use snmp in the future but as usual haven't had the time to implement it yet. thanks again. Daniel Handley Infrastructure Manager, HomePage Ltd mailto:daniel () homepage net http://www.homepage.net _______________________________________________ firewall-wizards mailing list firewall-wizards () nfr com http://list.nfr.com/mailman/listinfo/firewall-wizards _______________________________________________ firewall-wizards mailing list firewall-wizards () nfr com http://list.nfr.com/mailman/listinfo/firewall-wizards
Current thread:
- Re: Blocking at firewall via MAC address, (continued)
- Re: Blocking at firewall via MAC address Jeffrey Macko (Dec 15)
- Re: Blocking at firewall via MAC address Mark Coleman (Dec 15)
- Re: Blocking at firewall via MAC address Roelof JT Jonkman (Dec 22)
- Re: potential network attacks Tony Howlett (Dec 14)
- potential network attacks Daniel Handley (Dec 14)
- Re: potential network attacks Paul Robertson (Dec 14)
- Re: potential network attacks black (Dec 15)
- Re: potential network attacks Paul Robertson (Dec 16)
- RE: potential network attacks Wayne T Work (Dec 15)
- RE: potential network attacks John Adams (Dec 16)
- Re: potential network attacks black (Dec 15)
- Re: potential network attacks Shahryar Jahangir (Dec 14)
- RE: potential network attacks Tin Ngo (Dec 15)