Snort mailing list archives

Re: MS-SQL Worm propagation -false positive


From: Martin Olsson <elof () sentor se>
Date: Fri, 9 Jan 2004 10:06:47 +0100 (CET)


On Thu, 8 Jan 2004, Natalie Keller wrote:
Over a 5 minute interval Snort captured more than 500 scans with the
classic signature for MS-SQL Worm propagation.
The originating ip belonged to a laptop running XP with all up-to-date
connected to the network over VPN 3-DES tunnel. The laptop was brought
to IT for cleaning. The laptop was found to be  up-to-date with all
patches/service packs. The drive was scanned with Norton Anti-virus with
all current signatures and came up clean. The laptop has been back on
the network for 2 days with no further incidents. This would appear to
be a false positive. Is there any other steps that could have been taken
to track down and account for the original cause for this incident?
Suggestions welcome.

Are you sure that the originating IP wasn't spoofed with the laptops IP
address?

If you have the alerts logged in pcap format and your snort sensor was
connected to the same network segment as the offending machine, use
tcpdump -e to find the MAC-address of the source. Then find the machine
with this MAC address, that's the infected one.

/Martin



-------------------------------------------------------
This SF.net email is sponsored by: Perforce Software.
Perforce is the Fast Software Configuration Management System offering
advanced branching capabilities and atomic changes on 50+ platforms.
Free Eval! http://www.perforce.com/perforce/loadprog.html
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users


Current thread: