LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-01-2012, 12:20 AM   #1
Ztcoracat
LQ Guru
 
Registered: Dec 2011
Distribution: Slackware, MX 18
Posts: 9,484
Blog Entries: 15

Rep: Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176
Internet Security/Spoofing


Hi
Before I open a terminal and start putting in commands I just wanted to talk to someone about this spoofing that I think I have going on.

Each time my firewall is attacked it's been a different port each time but always begins with the number 4 and the source is either 91. or 199. The length has been 1500.
The protocol has always been Transmission Control Protocol.

Could this TCP be my laptop trying to connect to my desktop pc down the hall?

If it indeed this is spoofing how would I verify the authenticity of the datagrams?

Last edited by Ztcoracat; 02-01-2012 at 12:25 AM. Reason: Additional information
 
Old 02-01-2012, 12:58 AM   #2
kasl33
Member
 
Registered: Oct 2004
Location: USA
Distribution: Ubuntu-Server, Mac OS X, Arch Linux
Posts: 356

Rep: Reputation: 48
Install Wireshark and start capturing packets. You can see the MAC address, ports, data, protocol, and everything else about the packets hitting your computer.
 
Old 02-02-2012, 09:38 AM   #3
Noway2
Senior Member
 
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125

Rep: Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781
Quote:
Before I open a terminal and start putting in commands I just wanted to talk to someone about this spoofing that I think I have going on. ... Each time my firewall is attacked
Please elaborate. What do you mean by spoofing and how do you know it is an attack? Do you have log or other information that you could share? At LQ-Security, we deal with facts, not supposition and guesswork. Please provide data and we will gladly help you analyze it to determine what is happening and help you figure out what to do about it.
 
Old 02-02-2012, 06:45 PM   #4
Ztcoracat
LQ Guru
 
Registered: Dec 2011
Distribution: Slackware, MX 18
Posts: 9,484

Original Poster
Blog Entries: 15

Rep: Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176
Ports Source and etc.

Port number 43737 Source 91.189.94.12 Protocol TCP First hit Length 1500

Port number 45057 Source 199.7.48.231 Protocol TCP Second hit Length 1500

Haven't been hit yet today but I have only been online for 30 min's. It's now 8:05p.m. and I just got hit 3 more times.

Feb.2 20:00:37 wlano Port 32866 Source 72.14.204.102 Length 1470
Feb.2 20:00:45 wlano Port 32870 Source 72.14.204.102 Length 916
Feb.2 20:00:54 wlano Port 32866 Source 72.14.204.102 Length 1470

The service for these 3 are Sun-RPC portmap
The address is 1600 Amphitheatre Parkway
San Jose, Ca
Google Headquarters

What should I do?

Last edited by Ztcoracat; 02-02-2012 at 08:02 PM. Reason: Type what Firestarter says
 
Old 02-02-2012, 08:55 PM   #5
shadowbox12
Member
 
Registered: Mar 2010
Posts: 52

Rep: Reputation: 3
You mentioned these are firewall logs. I'm assuming you mean from your gateway firewall and not the iptables on your local machine. If that's the case I wouldn't worry about it as a gateway firewall will naturally be flooded with packets of a mysterious and potentially hostile nature as part of its job. If these are coming from the local machine you'll want to do a netstat -ap to see if there is an app on your machine with an active connection on those ports that may have started the communication. The traffic you are seeing could just be a response.
 
Old 02-02-2012, 10:15 PM   #6
Ztcoracat
LQ Guru
 
Registered: Dec 2011
Distribution: Slackware, MX 18
Posts: 9,484

Original Poster
Blog Entries: 15

Rep: Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176
Shadowbox12:
I checked netstat ap and everything in the terminal seems ok.

I think your right it was just traffic that was a response.

I went to https://www.grc.com/port_45057.htm....Shields up and checked on those ports and so far they are not a threat.


Thank you for helping me.
 
Old 02-03-2012, 08:16 AM   #7
Noway2
Senior Member
 
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125

Rep: Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781
Quote:
Google Headquarters
From your description, I assume the destination port was 80. Google and the other search engines operate web crawling bots that go out and find web sites to index. This is normal activity. If you do not operate a web page, you can safely ignore it. As shadowbox12 pointed out, you will also see lots of more hostile traffic appear in your logs which is the result of scanners and other programs. If you are not operating server application, including SSH, you can leave these ports closed and these scans should be inconsequential.
 
Old 02-03-2012, 02:22 PM   #8
Ztcoracat
LQ Guru
 
Registered: Dec 2011
Distribution: Slackware, MX 18
Posts: 9,484

Original Poster
Blog Entries: 15

Rep: Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176
Quote:
Originally Posted by Noway2 View Post
From your description, I assume the destination port was 80. Google and the other search engines operate web crawling bots that go out and find web sites to index. This is normal activity. If you do not operate a web page, you can safely ignore it. As shadowbox12 pointed out, you will also see lots of more hostile traffic appear in your logs which is the result of scanners and other programs. If you are not operating server application, including SSH, you can leave these ports closed and these scans should be inconsequential.
As I don't operate a web page I will as you mentioned; safely ignore the sites to index.

Thank you and Have A Good Weekend
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Attempting DNS spoofing experiment on a LAN with no internet access tmanabix Linux - Security 1 05-19-2011 10:08 AM
Fake Internet Gateways Script, Auto-Arp spoofing paxcastrensis Linux - Software 2 03-26-2011 02:49 PM
Internet Security clue_less Linux - Newbie 2 05-03-2007 09:17 AM
Spoofing Mozilla as Internet Explorer Ray>Ubuntu-User Linux - General 2 07-27-2006 10:54 PM
News: Spoofing Is a Security Flaw ?? m_shroom Linux - Security 1 11-05-2004 08:57 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:53 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration