Re: brute3.tar.gz

2004-12-16 Thread John Von Essen
Running tcpdump to a file worked out. This morning I was able to find the source machine by looking at that packet capture file. Someone gained legitimate access to the box via ssh using the oracle user. My stupid incompetent DBA's never set the password to something that wouldn't be obvious, like

Re: brute3.tar.gz

2004-12-16 Thread Peter Jeremy
On Wed, 2004-Dec-15 18:55:20 -0500, John Von Essen wrote: >Whatever this thing is, its tricky. It only runs a few times a day, so it >is tough to find the culprit source with ethereal unless I run ethereal >all day. In packet capture mode. Depending on how much disk space you have spare on your fi

Re: brute3.tar.gz

2004-12-15 Thread John Von Essen
Hmm... Interesting. What if I try to redirect the output of tcpdump to a file. I am doing this on a f5 BigIP which sort of runs a "FreeBSD-ish" kernel. I've tried: tcpdump -i exp1 port ssh | grep -v '63.123' | grep -v 'lb01' >/var/ssh.capture But it never rights to the file. The above will capt

brute3.tar.gz

2004-12-15 Thread John Von Essen
machine behind one of my gateways (BigIP) was trying to download a file called brute3.tar.gz via HTTP from 64.40.108.77. The download was unsuccessful. Whatever this thing is, its tricky. It only runs a few times a day, so it is tough to find the culprit source with ethereal unless I run ethereal all