Snort mailing list archives
Re: Help! Very wierd traffic.
From: Frank Knobbe <fknobbe () knobbeits com>
Date: 19 Feb 2003 17:57:50 -0600
On Wed, 2003-02-19 at 11:30, Yonah Russ wrote:
Hi, I am getting some very weird traffic from a network. It shows up in snort as NMAP TCP Scans and MISC source port 53 < 1024 alerts but there really seems to be a whole conversation- I can't figure out what the conversation is about though- it doesn't match any protocol in ethereal. Here is a dump of the traffic- any ideas? 02/19-16:39:34.375895 212.25.105.34:55 -> xxx.xxx.xxx.xxx:37852 UDP TTL:55 TOS:0x0 ID:46272 IpLen:20 DgmLen:38 Len: 18 00 00 00 00 00 00 00 00 00 00 .......... =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 02/19-16:39:34.376092 xxx.xxx.xxx.xxx -> 212.25.105.34 ICMP TTL:255 TOS:0x0 ID:27737 IpLen:20 DgmLen:66 DF Type:3 Code:3 DESTINATION UNREACHABLE: PORT UNREACHABLE ** ORIGINAL DATAGRAM DUMP: 212.25.105.34:55 -> xxx.xxx.xxx.xxx:37852 UDP TTL:55 TOS:0x0 ID:46272 IpLen:20 DgmLen:38 Len: 18 ** END OF DUMP 45 00 00 26 B4 C0 00 00 37 11 FD 25 D4 19 69 22 E..&....7..%..i" 93 A1 01 04 00 37 93 DC 00 12 99 D5 00 00 00 00 .....7.......... 00 00 00 00 00 00 ......
Oh, thanks. Doesn't help much to obfuscate your address with x.x.x. when it's still in the packet dump ;) Let's see. 212.25.105.34 sent you (147.161.1.4) a UDP packet to your port 37852. The source port was 55. Strangely enough, it's the same as the TTL. I'll bet a six-pack that this packet was part of a traceroute (increasing source port number as it's increasing the TTL). A TTL of 55 seems a bit high though, given that both of you are in Israel. You might want to do a traceroute to his IP and confirm the TTL. Next...
02/19-16:39:34.376328 212.25.105.34:80 -> xxx.xxx.xxx.xxx:53 TCP TTL:55 TOS:0x0 ID:46274 IpLen:20 DgmLen:40 ***A**** Seq: 0x38A Ack: 0x0 Win: 0x578 TcpLen: 20 =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 02/19-16:39:34.376424 xxx.xxx.xxx.xxx:53 -> 212.25.105.34:80 TCP TTL:64 TOS:0x0 ID:27738 IpLen:20 DgmLen:40 DF *****R** Seq: 0x0 Ack: 0x0 Win: 0x0 TcpLen: 20
He is doing an ACK scan with nmap to your DNS port. Your box responds with a Reset. (I have confirmed that you have indeed port 53 open on that IP). Next...
02/19-16:39:34.376758 212.25.105.34:53 -> xxx.xxx.xxx.xxx:53 TCP TTL:55 TOS:0x0 ID:46275 IpLen:20 DgmLen:40 ******S* Seq: 0x4EB90C61 Ack: 0x0 Win: 0x578 TcpLen: 20 =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 02/19-16:39:34.376926 xxx.xxx.xxx.xxx:53 -> 212.25.105.34:53 TCP TTL:64 TOS:0x0 ID:27739 IpLen:20 DgmLen:44 DF ***A**S* Seq: 0x78F6EB69 Ack: 0x4EB90C62 Win: 0xC0A0 TcpLen: 24 TCP Options (1) => MSS: 1460 =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 02/19-16:39:37.738097 xxx.xxx.xxx.xxx:53 -> 212.25.105.34:53 TCP TTL:64 TOS:0x0 ID:27740 IpLen:20 DgmLen:44 DF ***A**S* Seq: 0x78F6EB69 Ack: 0x4EB90C62 Win: 0xC0A0 TcpLen: 24 TCP Options (1) => MSS: 1460 =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 02/19-16:39:39.372827 212.25.105.34:53 -> xxx.xxx.xxx.xxx:53 TCP TTL:55 TOS:0x0 ID:46590 IpLen:20 DgmLen:40 *****R** Seq: 0x4EB90C62 Ack: 0x0 Win: 0x578 TcpLen: 20 =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
He is telnetting to your DNS port from port 53. Most likely not by hand (as that would be a high port number on his end). My guess is either an nmap TCP scan, or some tool, perhaps netcat. I don't think it was a version.bind attempt since there was really no data exchanged in that session (look at the tcplen). So what do we got? A scan, reconnaissance probe, nothing more. Cheers, Frank
Attachment:
signature.asc
Description: This is a digitally signed message part
Current thread:
- Barnyard woes Joerg Weber (Feb 18)
- Re: Barnyard woes Ken Gunderson (Feb 18)
- Re: Barnyard woes Paul Schmehl (Feb 18)
- Re: Barnyard woes Andrew R. Baker (Feb 18)
- Re: Barnyard woes Ken Gunderson (Feb 19)
- Re: Barnyard woes Andrew R. Baker (Feb 19)
- Re: Barnyard woes Ken Gunderson (Feb 19)
- Help! Very wierd traffic. Yonah Russ (Feb 19)
- Re: Help! Very wierd traffic. Matt Kettler (Feb 19)
- Re: Help! Very wierd traffic. Yonah Russ (Feb 19)
- Re: Help! Very wierd traffic. Frank Knobbe (Feb 19)
- Re: Barnyard woes Ken Gunderson (Feb 19)
- Re: Barnyard woes Ken Gunderson (Feb 18)