Snort mailing list archives

STEALTH ACTIVITY (NULL scan) ???


From: "Ing. Daniel Manrique" <roadmr () entropia com mx>
Date: Wed, 24 Apr 2002 12:16:47 -0500 (CDT)


Hey! I'm seeing some strange activity on my network and would greatly 
appreciate help in deciphering what it is.

I started using snort about 2 weeks ago, and I've observed the following 
strange activity a few times since then:

04/23-23:54:46.882291  [**] [111:9:1] spp_stream4: STEALTH ACTIVITY (NULL 
scan) detection [**] {TCP} 90.52.129.113:57321 -> 200.254.252.57:27907
04/23-23:54:46.882291  [**] [111:9:1] spp_stream4: STEALTH ACTIVITY (NULL 
scan) detection [**] {TCP} 153.141.187.122:57833 -> 200.254.252.57:59152
04/23-23:54:46.882291  [**] [111:9:1] spp_stream4: STEALTH ACTIVITY (NULL 
scan) detection [**] {TCP} 198.73.154.16:58345 -> 200.254.252.57:19667
04/23-23:54:46.882291  [**] [111:9:1] spp_stream4: STEALTH ACTIVITY (NULL 
scan) detection [**] {TCP} 51.104.227.88:58601 -> 200.223.171.4:21762
04/23-23:54:46.882291  [**] [111:9:1] spp_stream4: STEALTH ACTIVITY (NULL 
scan) detection [**] {TCP} 213.237.10.72:59113 -> 200.223.171.4:53374

At random times during the day, I start seeing LOTS of these (1-2 million 
of these in a 5 minute period). Then it stops all of a sudden. This 
activity of course fills up my logs (processing a 1-gb logfile is no fun) 
and saturates both my backbone LAN and my outgoing internet connection.

What's interesting is that neither one of the IP addresses reported by
snort is in my class-C network; furthermore, the destination address (the
one after the ->) is always the same (or one of two repeating addresses,
like in the example); and interestingly, they're all located in brazil.

My initial suspicion is that one of the hosts on our network was
compromised by brazilian crackers. However, since the strange activity
presents no evidence to support this fact, and I don't own the server in
question, it's a bit hard to tell the owner their server is compromised. I
have even pinpointed the offending server by unplugging its network cable
and observing the strange activity stops.

Still, I'd like to find something in my logs or packet dumps that 
indicates the server in question is involved in these events. This would 
make it easy to confront the server's owner with hard evidence and ask him 
to either solve the problem or face disconnection (heheh).

Also, and a bit off-topic, my gateway router is a Cisco 3620 with IOS 
11.2, and I'd like to add filtering rules to drop packets not coming to, 
or originating from, my class-C network. Logic dictates that, as in this 
case, packets with both origin and destination addresses in foreign 
networks wouldn't make it past the router, thus avoiding the saturation 
I'm seeing.

So, if anyone knows what this kind of activity means, and/or how to 
implement the routing filter I mention, I'd be really really grateful :)

thanks for any help you can provide!

        - Roadmaster


_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users


Current thread: