LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Closed Thread
  Search this Thread
Old 05-19-2010, 12:34 PM   #1
shahmeer75
LQ Newbie
 
Registered: May 2010
Posts: 7

Rep: Reputation: 0
Wink Malicious Activity, Packet Capture file attached


Please find the attached Packet Capture file,what has happened to the host addressed 192.168.1.101.How it will impact network on the findings and is there any possible remediation strategies?

Any replies will be appreciated. Thank you in advance.

PS: Please rename the file to packet_capture.zip and extract the pcap file.
Attached Files
File Type: log packet_capture.log (219.0 KB, 53 views)

Last edited by win32sux; 05-26-2010 at 04:20 PM. Reason: Restored original content.
 
Old 05-20-2010, 04:38 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by shahmeer75 View Post
what has happened to the host addressed 192.168.1.101.
* Note the pcap shows about 80 percent TCP. The rest mostly is ARP so you may want to adjust your BPF filtering so you log only what you're interested in.

0. Run the capture through Snort in pcap-reading mode and you'll find these SIDs:
Code:
1:1418:13 SNMP request tcp 
1:1420:13 SNMP trap tcp 
1:1421:13 SNMP AgentX/tcp request 
1:402:8 ICMP Destination Unreachable Port Unreachable 
1:491:8 INFO FTP Bad login <- interesting
1:648:9 SHELLCODE x86 NOOP <- interesting
1. The SHELLCODE x86 NOOP SID occurred once, from an IP in the 3215 AS. Follow the conversation in Wireshark and you'll see the remote IP connected successfully over SMB to the system's default share (as anonymous user).

2. FTP Bad login SID occurred 5 times, FTP traffic occurred with one IP in the 3462 9680 AS and one IP in the 15024 AS. The remote host from the 3462 9680 AS was able to log in as user administrator (the account was enabled and had a very simple password) and used the FTP scanner by Inode (search for "RMD sarcaxxo").


Quote:
Originally Posted by shahmeer75 View Post
How it will impact network on the findings and is there any possible remediation strategies?
As the host does not run GNU/Linux or UNIX it is not in this forums task (see /General) to provide security advice for that platform. Needless to say the machine should be taken off-line for further investigation and the person or persons "managing" the machine flogged, demoted and fired for incompetence and negligence :-]
 
Old 05-22-2010, 03:43 PM   #3
shahmeer75
LQ Newbie
 
Registered: May 2010
Posts: 7

Original Poster
Rep: Reputation: 0
Thanks for your reply. I can see the points mentioned. What about the host addressed 192.168.1.101? Is there anything happened with that? I really appreciate your response. Thank you again



Quote:
Originally Posted by unSpawn View Post
* Note the pcap shows about 80 percent TCP. The rest mostly is ARP so you may want to adjust your BPF filtering so you log only what you're interested in.

0. Run the capture through Snort in pcap-reading mode and you'll find these SIDs:
Code:
1:1418:13 SNMP request tcp 
1:1420:13 SNMP trap tcp 
1:1421:13 SNMP AgentX/tcp request 
1:402:8 ICMP Destination Unreachable Port Unreachable 
1:491:8 INFO FTP Bad login <- interesting
1:648:9 SHELLCODE x86 NOOP <- interesting
1. The SHELLCODE x86 NOOP SID occurred once, from an IP in the 3215 AS. Follow the conversation in Wireshark and you'll see the remote IP connected successfully over SMB to the system's default share (as anonymous user).

2. FTP Bad login SID occurred 5 times, FTP traffic occurred with one IP in the 3462 9680 AS and one IP in the 15024 AS. The remote host from the 3462 9680 AS was able to log in as user administrator (the account was enabled and had a very simple password) and used the FTP scanner by Inode (search for "RMD sarcaxxo").



As the host does not run GNU/Linux or UNIX it is not in this forums task (see /General) to provide security advice for that platform. Needless to say the machine should be taken off-line for further investigation and the person or persons "managing" the machine flogged, demoted and fired for incompetence and negligence :-]
 
Old 05-22-2010, 06:07 PM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by shahmeer75 View Post
What about the host addressed 192.168.1.101? Is there anything happened with that?
The machine should be taken off-line for further investigation. If you want more information than that you should provide more information first.
 
Old 05-24-2010, 09:25 AM   #5
OlRoy
Member
 
Registered: Dec 2002
Posts: 306

Rep: Reputation: 86
Those specific questions with a very specific pcap file sounds like a homework assignment to me.
 
1 members found this post helpful.
Old 05-25-2010, 09:08 AM   #6
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Quote:
Originally Posted by OlRoy View Post
Those specific questions with a very specific pcap file sounds like a homework assignment to me.
hahaha...you're probably right! I've never seen someone submit a pcap on the LQ forums (or maybe I missed those, but those types of attachments certainly aren't prominent).
 
Old 05-26-2010, 04:25 PM   #7
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Given that shahmeer75 has chosen to delete the original post's contents, I'm closing this thread. shahmeer75, you're new around here so I'll let you go with only a warning: Understand that LQ is about sharing knowledge, and by deleting your post's contents you've engaged in behavior which isn't in the spirit of LQ. Please don't do this sort of thing again.

Last edited by win32sux; 05-26-2010 at 04:36 PM.
 
  


Closed Thread



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Packet Capture Library wxShayan Programming 2 02-22-2010 12:46 AM
tshark - save capture packet to txt file varun.sharma Linux - Software 5 09-17-2009 12:04 PM
Capture Packet over the network aq_mishu Linux - Networking 5 03-25-2008 10:04 AM
A packet filter using libipq which uses ether type field to capture the packet can26_manish Programming 2 10-16-2007 05:35 AM
how do i read the data in the packet that i have captured after packet capture? gajaykrishnan Programming 23 04-19-2006 05:09 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:57 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration