LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-02-2008, 08:13 AM   #1
kav
Member
 
Registered: May 2006
Location: USA
Distribution: FreeBSD Ubuntu Debian
Posts: 137

Rep: Reputation: 15
What does this snort log look like to you?


Does this say what I think it does?
I'm going to be rebuilding this box when I get back from work today aren't I?

The traffic from 192.168.1.44 is being picked up because it is connected to the same hub as the scanning computer.

Code:
[**] [122:3:0] (portscan) TCP Portsweep [**]
[Priority: 3]
01/02-06:44:34.543798 192.168.1.44 -> 90.157.227.80
PROTO:255 TTL:0 TOS:0x0 ID:4987 IpLen:20 DgmLen:164

[**] [1:1398:10] EXPLOIT CDE dtspcd exploit attempt [**]
[Classification: Misc Attack] [Priority: 2]
01/02-06:48:35.413985 192.168.1.44:1811 -> 125.236.157.217:6112
TCP TTL:128 TOS:0x0 ID:29698 IpLen:20 DgmLen:82 DF
***AP*** Seq: 0x2C161A2E  Ack: 0x6FE3F9B2  Win: 0x3DAE  TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2002-01.html][Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0803][Xref => http://www.securityfocus.com
/bid/3517]

[**] [122:3:0] (portscan) TCP Portsweep [**]
[Priority: 3]
01/02-06:48:35.768135 192.168.1.44 -> 124.190.59.129
PROTO:255 TTL:0 TOS:0x0 ID:21335 IpLen:20 DgmLen:170

[**] [1:1398:10] EXPLOIT CDE dtspcd exploit attempt [**]
[Classification: Misc Attack] [Priority: 2]
01/02-06:48:36.450540 192.168.1.44:1811 -> 125.236.157.217:6112
TCP TTL:128 TOS:0x0 ID:28395 IpLen:20 DgmLen:82 DF
***AP*** Seq: 0x2C161A2E  Ack: 0x6FE3F9B2  Win: 0x3DAE  TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2002-01.html][Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0803][Xref => http://www.securityfocus.com/bid/3517]

[**] [1:1398:10] EXPLOIT CDE dtspcd exploit attempt [**]
[Classification: Misc Attack] [Priority: 2]
01/02-06:48:44.220333 192.168.1.44:1811 -> 125.236.157.217:6112
TCP TTL:128 TOS:0x0 ID:30590 IpLen:20 DgmLen:124 DF
***AP*** Seq: 0x2C16E754  Ack: 0x6FE3F9E5  Win: 0x3D7B  TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2002-01.html][Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0803][Xref => http://www.securityfocus.com/bid/3517]

[**] [122:3:0] (portscan) TCP Portsweep [**]
[Priority: 3]
01/02-06:50:38.928917 192.168.1.44 -> 90.149.43.144
PROTO:255 TTL:0 TOS:0x0 ID:0 IpLen:20 DgmLen:168 DF

[**] [122:19:0] (portscan) UDP Portsweep [**]
[Priority: 3]
01/02-06:58:22.419030 192.168.1.44 -> 192.168.1.255
PROTO:255 TTL:0 TOS:0x0 ID:16711 IpLen:20 DgmLen:165

[**] [1:1398:10] EXPLOIT CDE dtspcd exploit attempt [**]
[Classification: Misc Attack] [Priority: 2]
01/02-06:58:26.028112 192.168.1.44:2609 -> 125.236.157.217:6112
TCP TTL:128 TOS:0x0 ID:18527 IpLen:20 DgmLen:82 DF
***AP*** Seq: 0x9A965A57  Ack: 0xF8A39458  Win: 0x4147  TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2002-01.html][Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0803][Xref => http://www.securityfocus.com/bid/3517]
 
Old 01-02-2008, 09:36 AM   #2
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Do a thorough investigation before reinstalling anything for two reasons:

1. You don't want to end up reinstalling the same way as you first did, negating a refresh of the OS. You want to understand how your machine was compromised so that you learn from it and adapt your install so that it doesn't happen again.

2. You may not even need to reinstall if this is a false positive or something that can be mitigated/lessened via layered security.

Looking at what you've posted, it appears IP 192.168.1.44 is scanning outbound and maybe attacking certain IPs utilizing port 6112.

I'd look into the raw snort logs (the payload or packet trace) to see whether these are 'real' events to worry about. Assess the signature (or rule) to determine if the packet traces are actually matching the snort rule's signature string.
 
Old 01-03-2008, 07:11 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by kav View Post
Does this say what I think it does?
If you run ancient (and I mean ancient) Sun / IBM / HP / SGI running the Common Desktop Environment (CDE) then yes, it probably does (do read them reference links, they are given for some reason). In all other cases check the box, firewalling and routing policies for what is listening on that port and who should be allowed access to it and adjust accordingly. Don't forget to update your snort.conf variables, suppression statements in the threshold.conf or BPF file contents.


Quote:
Originally Posted by kav View Post
I'm going to be rebuilding this box when I get back from work today aren't I?
Sure, if you've got nothing else to do :-]
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Log Rotation for snort log does not seem to be working CentOS4.5 JasonKretzer Linux - Security 3 06-25-2007 12:25 PM
snort log with SID dwarf007 Linux - Security 2 08-10-2006 01:50 AM
Snort don't want log to mysql lcat Slackware 1 03-07-2005 07:20 AM
I can't get snort to log anything abefroman Linux - Security 2 09-07-2004 09:09 AM
Snort is not log chamkila Linux - Security 19 06-18-2003 02:30 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:21 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration