could you please send me your addbad script, I think something like that
would be quite useful:)  I was compromised a while ago by rpc.statd too..

thanks...

On Mon, 22 Jan 2001, Michael H. Warfield wrote:

> On Mon, Jan 22, 2001 at 08:24:36AM -0600, Dave Ihnat wrote:
> > On Mon, Jan 22, 2001 at 08:13:50AM -0500, Burke, Thomas G. wrote:
> > > I've been noticing a _lot_ of scans against ports 21 & 111 in the last
> > > couple of weeks.  Do ya think this might be the result of the ramen worm?
> 
> > Those are standard ports for scans--yah, the frequency just went
> > up a bit, so I figure somebody in the cracker warrens must have
> > just posted or written an article about "common ports" or somesuch.
> > Upswing in 21,23,111,515, with a smattering of others thrown in, and
> > the ever-present 137 and 139.  No consistent source to the probes,
> > and not enough additional probes to raise alarm.
> 
>       Ports 21 and 111 are characteristic of Ramen, which is a self
> propagating worm attacking RedHat 6.2 and 7.0 systems.  Some sites
> are detecting floods of port 21 Syn requests as a result of infected
> systems.
> 
> > Have fun with it.  I have my box set up to notify me on-line when
> > I'm logged in.  Then, if it's a series--you know, they poke at
> > 137,139,21,23,25, 110,111, etc. in some order from the same place--
> > before I run my 'addbad' script to block everything from their IP address,
> > I poke back at ports on their IP address with the same port order.
> 
>       Be extremely cautious about doing that!  The "ramen worm" is
> certainly the cause for the increase in port 21 and 111 probes and
> your counterprobe will have no influence on it, but there are other
> scans going on out there that are different.  If you counterprobe
> a system back, you have just tipped of the scanner that 1) there is
> a valid system at this address of interest and 2) that system is
> running some sort of detections and countermeasures (making even more
> interesting).  That's often enough for one of these automated parallel
> scanners to flag your address and log it as something interesting for
> deeper, more personal investigation by the attacker himself.
> 
>       In other words...  Even by merely probing a system back that is
> scanning your ports, you may end up getting some unwanted attention from
> someone whom you would just as soon not know you even exist.  Then you
> have a problem.
> 
>       My systems detect port scanning and simply shut down the firewall
> to the scanner.  My entire /19 address space goes dark and the automated
> scanner leaves with the conclusion that there is nothing there.  It
> finds nothing to log and wanders on into the night.  :-)
> 
>       Food for thought.
> 
> > Their IP address usually suddenly disappears from the 'Net after the
> > 2nd or third reverse port probe.
> 
> > Cheers,
> > -- 
> >     Dave Ihnat
> >     [EMAIL PROTECTED]
> 
>       Mike
> 



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to