LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


Reply
  Search this Thread
Old 11-03-2003, 01:01 PM   #1
dave bean
Member
 
Registered: Jun 2003
Location: UK
Distribution: Slackware 9.1
Posts: 136

Rep: Reputation: 15
Being hacked -while using windows :(


Unfortunately to use the internet i have to use my windows partition. I have been looking at my firewall logs today and have seen
-a DoS attack
-an Attacker Seal attack

my firewall dealt with both of these attacks but i am worried about what i see in the traffic logs. I am continually sending a UDP package to an IP address (always the same) on port 137, the machine then reciprocates a package on 138. The application involved is ntoskrnl.exe

I'd like to be running linux when i see things like this happening but unfortunately i have still to configure red hat to my wireless network.

Has ayone heard of a tool that would cause this UDP exchange to occur ? What's the best course of action from here ?

Thanks
 
Old 11-03-2003, 01:13 PM   #2
Misel
Member
 
Registered: Mar 2003
Location: Berlin
Distribution: Slackware current
Posts: 310

Rep: Reputation: 31
Zonealarm and block the port - or rip out the cable
 
Old 11-03-2003, 02:41 PM   #3
dave bean
Member
 
Registered: Jun 2003
Location: UK
Distribution: Slackware 9.1
Posts: 136

Original Poster
Rep: Reputation: 15
thanks, i already blocked it but i can see in the logs it still keeps attempting to send - even after a reboot. is this a sign that my machine has already been compromisied ?
 
Old 11-03-2003, 02:59 PM   #4
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
Hard to say. Windows netbios service runs on port 137, so it could be legitimate traffic. If your machine is part of a network with multiple windows systems, then you should expect to see lots of it. If you have any doubts whatsoever though, just un-plug the machine from the network until you're sure it's clean.

Hopefully you have some type of Antivrus software, so make sure your virus definitions are up to date If they're not, you can download the definitions using another computer and transfer them on a floppy. If you don't have AV, this would be a pretty subtle hint that you should buy one. Then do a scan of your entire system. There are also some freeware trojan detectors that you can find with a google search.
 
Old 11-03-2003, 03:13 PM   #5
kidashy
Member
 
Registered: Jul 2003
Location: GA, US
Distribution: Gentoo
Posts: 34

Rep: Reputation: 15
Are you behind a router? or a hardware firewall other than software?

What kind of troubles are you having with your wireless network with redhat?
what brand is it?
Hopefully it isn't something like belkin... :-o but even that is better than nothing.
 
Old 11-04-2003, 01:36 AM   #6
Robert0380
LQ Guru
 
Registered: Apr 2002
Location: Atlanta
Distribution: Gentoo
Posts: 1,280

Rep: Reputation: 47
almost sounds like msblast.exe.


there is a nice program called Stinger.exe that checks for the more common worms/viruii/trojans and variants. we run it on my job (over 6,000 hosts with public IPs all connected to the internet with no firewall unless the user installs one).

Stinger.exe, ZoneAlarm, Virus Scan (McAfee) and a Mozilla install are our weapons. Most of our problems recently have come from IE letting web pages and banner ads screw around with the file system (oh and file sharing software that comes with all types of malware/spyware/adware).

here is the link to stinger: http://vil.nai.com/vil/stinger/ it's from a trusted company (NAI) the same people that make McAfee virus scan.
 
Old 11-04-2003, 05:49 AM   #7
dave bean
Member
 
Registered: Jun 2003
Location: UK
Distribution: Slackware 9.1
Posts: 136

Original Poster
Rep: Reputation: 15
thanks, ill check that out, i ran spybot but i didn't find anything.

Im not in a network, - only me and the router. Im behind 3 firewalls. WindowsXP wall, router firewall, and a commercial wall. I think i know how to sort out linux with the internet, its just a case of downloading some drivers, but i havn't had the chance to do it yet. Kinda chuffed DoS didnt even touch my system
 
Old 11-04-2003, 03:01 PM   #8
Peacedog
LQ Guru
 
Registered: Sep 2003
Location: Danville, VA
Distribution: Slackware, Windows, FreeBSD, OpenBSD, Mac OS X
Posts: 5,296

Rep: Reputation: 168Reputation: 168
the application ntoskrnl.exe is your windows kernel. if a virus somehow got in and renamed itself or attached itself to the kernel, i'd expect boot problems. with the file protection implemented in win2k sp2, it could very well be possible.

edited

felt i should elaborate, the file protection put on sys files w/ sp2 was put in place to protect the kernel & all sys files. if the kernal is altered, it shows up w/ a diff. name and boot.ini is ediited to boot from the clean kernel. so in theory the alleged virus could be running and active, as, ntoskrnl.exe. i'd check my boot.ini file and see what it says, i'd also follow the above recomendations as to anti-virus software. i have not yet, but, will search the security forums on this subject, as they probably have more useful info. good luck.

Last edited by Peacedog; 11-04-2003 at 07:55 PM.
 
Old 11-04-2003, 03:17 PM   #9
mossy
Member
 
Registered: Aug 2003
Location: USexIRL
Distribution: *nix
Posts: 849

Rep: Reputation: 30
mblaster runs on port 135 [ unless a variant uses another port ].
 
Old 11-06-2003, 04:12 AM   #10
kidashy
Member
 
Registered: Jul 2003
Location: GA, US
Distribution: Gentoo
Posts: 34

Rep: Reputation: 15
With all the firewalls you have with the exception of the windowsxp firewall.. Id suspect that you're probably safe. I don't think anyone would have the time to hack into your system unless you seriously made them angry or you have something they just gotta have.
If I understand how long it takes to hack through most routers. You're probably fine
I would sort out your issues with linux and the internet though asap.
 
Old 11-06-2003, 04:40 AM   #11
dave bean
Member
 
Registered: Jun 2003
Location: UK
Distribution: Slackware 9.1
Posts: 136

Original Poster
Rep: Reputation: 15
thats true, its hardly worth the effort. But i was reading yesterday that becos wireless netorks operate on the unlicensed spectrum of 2.4 or 5 ghz interference by mobile phones and microwaves can cause what apears to be DoS attacks.

Im thinking the attacks are probly this interference as only a really stupid hacker wud keep DoS'ing my system when it acheives absolutely nothing. You are right about me getting online with linux - maybe this wkend . . .
 
Old 11-06-2003, 01:42 PM   #12
mossy
Member
 
Registered: Aug 2003
Location: USexIRL
Distribution: *nix
Posts: 849

Rep: Reputation: 30
There are many virus variants of the mblaster and it could still possibly be one of those. There is even on e that will destroy your dns [just to annoy you].
 
Old 12-13-2003, 08:51 PM   #13
ChasidishHarry
Member
 
Registered: Nov 2003
Distribution: Mandrake 9.1
Posts: 377

Rep: Reputation: 30
Quote:
Originally posted by dave bean

Im thinking the attacks are probly this interference as only a really stupid hacker wud keep DoS'ing my system when it acheives absolutely nothing. You are right about me getting online with linux - maybe this wkend . . .

you're probably right
 
Old 12-13-2003, 11:01 PM   #14
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
If it was interference from other wireless devices like phones or microwaves you wouldn't see packets addressed to port 137 or any port whatsoever. I'm not an electrical engineer, but I don't think your microwave cooks food by sending netbios packets at it Usually with wireless interference either you get really bad signal degradation, to the point where it brings your network to a crawl or overloads that portion of the spectrum and you get something similar to a syn-flood. Either way you wouldn't be seeing structured TCP/IP packets.

I would put my money on a misconfigured system or viral-generated traffic. If you really want to find out, you can get Linux up and turn on tcpdump/ethereal and take a look at the packets.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Did I get hacked? drj000 Linux - General 3 01-13-2005 02:54 PM
Have I been hacked? af_dave Linux - Security 3 07-14-2004 02:02 PM
Why can't Windows be hacked? snowman156 General 20 06-20-2004 05:49 PM
HELP I think i got hacked spank Linux - Newbie 5 03-24-2004 08:59 AM
Was I hacked? aethereal Linux - Security 3 04-05-2001 04:24 PM

LinuxQuestions.org > Forums > Non-*NIX Forums > General

All times are GMT -5. The time now is 11:58 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration