Security Incidents mailing list archives

Re: portscan on tcp ports 1024 to 1280


From: dr john halewood <john () frumious unidec co uk>
Date: Wed, 17 Oct 2001 18:45:47 +0100

On Wednesday 17 October 2001 18:05, Fletcher Mattox wrote:
What application or exploit probes every tcp port between 1024 and 1280
(i.e. 256 different ports in random order).  The source port is always
80 or 0.  Every host on our network is being scanned in this manner from
several different places.  Some source ip addresses are:

It seems to me that what you're actually seeing is packets coming back from a 
server when someone's been spoofing your IP address. Ports 1024 and upwards 
are generally used for outgoing (originating) traffic from Microsoft (and 
others) IP stacks. Packets coming back from port 80 is usually a response 
from a web server. IIRC I've seen the combination httpd/tcpmux port 
combination used in the past by some hacker tools. Anyone remember which?

cheers
john

----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management 
and tracking system please see: http://aris.securityfocus.com


Current thread: