funny firewall hits

Open discussion about any topic, as long as you abide by the rules of course!
Dr_Watson
Posts: 5237
Joined: Wed Feb 23, 2000 8:00 am

funny firewall hits

Post by Dr_Watson »

heh, i was cleaning out my safepeer.log file since it had gotten over 5 meg (havn't cleared it in months) ... so i'm scanning though and amid the gaggle of usual university and military base blockages (i don't support the troop's warez habbits) i see this one:

5 Nov 05 05:38:43 - INFO -> IP '195.182.77.139' in range 'office of the president of the republic of lithuania' has been blocked on 'Sat Nov 05 05:35:40 EST 2005' for torrent'

fucking gold. :olo:

saw some ones in there that make me happy i'm running it too.
multiple hits from sony and MPAA ip addresses. :icon14:
User avatar
seremtan
Posts: 36013
Joined: Wed Nov 19, 2003 8:00 am

Post by seremtan »

what firewall is this?
eepberries
Posts: 1975
Joined: Mon Jan 24, 2005 10:14 pm

Post by eepberries »

seremtan wrote:what firewall is this?
R00k
Posts: 15188
Joined: Mon Dec 18, 2000 8:00 am

Post by R00k »

This is interesting. After reading your post I decided to check out my logs, since I never really do.

It seems that back in July and earlier I was getting a TON of trojan attempts from this address:

Code: Select all

[16/Jul/2005 06:48:46]  "Ids" action = 'deny', raddr = '82.54.68.248', msg = 'BACKDOOR trojan active millenium', url = 'http://www.whitehats.com/info/IDS82', direc = 'in', class = 'successful-user', priority = high
Whitehats.com isn't serving web pages, so I did a WHOIS on the domain, and came up with this:

domain: WHITEHATS.COM
owner-name: Kimi Networks
owner-address: 73 Webster
owner-address: 94117
owner-address: San Francisco
owner-address: California
owner-address: United States of America
owner-phone: +1.4159990815
owner-e-mail: vision@whitehats.com

person: Max Vision
nic-hdl: MV303-GANDI
address: 73 Webster
address: 94117
address: San Francisco
address: California
address: United States of America
phone: +1.4159990815
e-mail: vision@whitehats.com
lastupdated: 2005-11-06 16:45:47


So for the hell of it I decided to Google the owner name, Kimi Networks. I wasn't expecting the very first hit to be this:
http://www.sfgate.com/cgi-bin/article.c ... N57003.DTL
FBI Computer Expert Accused of Hacking

Henry K. Lee, Chronicle Staff Writer

Friday, March 24, 2000

Max Ray Butler seemed to be at the top of his game. For two years, the computer expert was a confidential source for an elite FBI computer crime squad, helping to ferret out scofflaws on the Internet.

Butler, also known as Max Vision, was also a self-described ``ethical hacker'' from the Silicon Valley who boasted that he could test the security of any computer system by penetrating it.

But Butler's cyber activity went too far, federal authorities say.

****SNIP****

In 1997, Butler started a company known as Max Vision in Mountain View, specializing in ``penetration testing'' and ``ethical hacking'' procedures in which he would simulate for clients how a hacker would penetrate their computer systems, according to the company Web site.

``Our client penetration rate is currently 100 percent,'' the site said, with recent clients including a large consortium of telecommunications companies, a major motion picture company and an e-commerce online auction service.

By 1998, Butler was living with Winters in a one-story San Jose apartment, where the couple started up their own Web-design company, Kimi Networks, records show. Reached by telephone yesterday, Winters hung up on a Chronicle reporter.

It was also from that apartment, according to the FBI, that Butler hacked into computers by using a computer software vulnerability known as a buffer overflow, which sends commands into a system that ordinarily would not be allowed.

Butler also allegedly invaded computers used by the Lawrence Berkeley National Laboratory. Vern Paxson, a computer scientist at the lab, noticed an online intruder conducting unauthorized scans of laboratory and UC Berkeley computers in May 1998 and used a monitoring device that later helped identify the source of the intrusions.
WTF? So the guy was FBI, was busted in 2000, and was still trying to break into my PC in July of this year? :o!
R00k
Posts: 15188
Joined: Mon Dec 18, 2000 8:00 am

Post by R00k »

After playing with my log and sorting it in Excel, I found 2,662 hits from that address, between March 24 and October19 this year.

He has tried several different trojans against me:

Vampire
Deltasource
hack99keylogger
ambush
netspy
theprayer1
schoolbus
millenium
devil103
sennaspy

Seriously, WTF?
pookie
Posts: 46
Joined: Tue Oct 18, 2005 9:27 pm

Post by pookie »

He isn't trying to break in. Your security device is pointing to an old web site. He used to write IDS signatures and maintain a online security database before he get sent up. The device is pointing to his old informational web pages, which haven't been active in years.

The ip listed, 82.54.68.248, is the blocked ip. Its an italian dial-up address. Probably, just some kids playing around.
Last edited by pookie on Sun Nov 13, 2005 7:36 pm, edited 1 time in total.
andyman
Posts: 11198
Joined: Wed Feb 09, 2005 8:20 pm

Post by andyman »

so what firewall is this so i can use it
SoM
Posts: 8489
Joined: Fri Dec 03, 1999 8:00 am

Post by SoM »

they're onto you rook
[color=red][WYD][/color]S[color=red]o[/color]M
Canis
Posts: 3798
Joined: Sun Jan 14, 2001 8:00 am

Post by Canis »

Oh Rook, that was me....my bad.
R00k
Posts: 15188
Joined: Mon Dec 18, 2000 8:00 am

Post by R00k »

pookie wrote:He isn't trying to break in. Your security device is pointing to an old web site. He used to write IDS signatures and maintain a online security database before he get sent up. The device is pointing to his old informational web pages, which haven't been active in years.

The ip listed, 82.54.68.248, is the blocked ip. Its an italian dial-up address. Probably, just some kids playing around.
Looking through the list, there are 33 different originating IP addresses - the one I posted was just the one I picked out to post.

But my firewall is associating all these IPs to the same website - why is that? Are all these viruses known to originate from that site or something? How does it determine the URL to reference?

edit: And all the IPs are from different locations, and on different providers. Just a few at random:


12-217-32-30.client.mchsi.com
146-115-126-199.c3-0.arl-ubr1.sbo-arl.ma.cable.rcn.com
ACABD34B.ipt.aol.com
qnet1.irc.demon.net
ircd.b0rk.co.uk
d198-53-131-248.abhsia.telus.net
207-237-218-173.c3-0.80w-ubr6.nyr-80w.ny.cable.rcn.com
208-59-117-196.c3-0.161-ubr1.lnh-161.md.cable.rcn.com
212-139-67-101.dynamic.dsl.as9105.com
cm164032.red.mundo-r.com

It's not like I was getting DDOS'd because there isn't a heavy enough volume of hits for that.

It looks like a bunch of script kiddies trying to hit my IP (among many others I'm sure) with these trojans - although I did notice two that look like IRC servers. But were all these trojans created by that guy's company or something?
Last edited by R00k on Sun Nov 13, 2005 8:20 pm, edited 3 times in total.
R00k
Posts: 15188
Joined: Mon Dec 18, 2000 8:00 am

Post by R00k »

Canis wrote:Oh Rook, that was me....my bad.
I'll have to keep my eye on you. :icon6:
SoM wrote:they're onto you rook
It's a trap!!!
Image
R00k
Posts: 15188
Joined: Mon Dec 18, 2000 8:00 am

Post by R00k »

andyman wrote:so what firewall is this so i can use it
I don't know which one Watson is using, but I'm running Kerio Personal Firewall.
andyman
Posts: 11198
Joined: Wed Feb 09, 2005 8:20 pm

Post by andyman »

Thanks!
R00k
Posts: 15188
Joined: Mon Dec 18, 2000 8:00 am

Post by R00k »

NP, I always recommend it to anybody who needs a software firewall, it's great. :icon14:
andyman
Posts: 11198
Joined: Wed Feb 09, 2005 8:20 pm

Post by andyman »

If I have a router, does that have a built in firewall? Or should I use this in conjunction?
Canis
Posts: 3798
Joined: Sun Jan 14, 2001 8:00 am

Post by Canis »

Routers will protect your network from the internet, but there is always potential for things to get through the router's firewall. If that happens, then a firewall on your computer will protect you from your network.
R00k
Posts: 15188
Joined: Mon Dec 18, 2000 8:00 am

Post by R00k »

You should use this in conjunction with the router.

I have a router, but all this stuff is getting blocked by my firewall, so it's getting past the router.

Routers aren't nearly as good at stopping intrusions as a firewall - unless you have a nice expensive one by Cisco or the like. They mainly just sort-of hide your PC, but most don't do any active blocking or packet filtering.
andyman
Posts: 11198
Joined: Wed Feb 09, 2005 8:20 pm

Post by andyman »

It's just a Lynksis with a Cisco label on the corner.....all the good routers are at work, and I don't have the slightest on how to work them anyways :D
Canis
Posts: 3798
Joined: Sun Jan 14, 2001 8:00 am

Post by Canis »

It wont hurt to install a software firewall. At most it may conflict with the built-in windows firewall, but you can fix this by turning off the windows firewall (its only a generic one anyway, with minimal features).
Grudge
Posts: 8587
Joined: Mon Jan 28, 2002 8:00 am

Post by Grudge »

R00k wrote:You should use this in conjunction with the router.

I have a router, but all this stuff is getting blocked by my firewall, so it's getting past the router.

Routers aren't nearly as good at stopping intrusions as a firewall - unless you have a nice expensive one by Cisco or the like. They mainly just sort-of hide your PC, but most don't do any active blocking or packet filtering.
On the other hand, how many |33t H4XX0rZ are interested in what you have on your computer?
pookie
Posts: 46
Joined: Tue Oct 18, 2005 9:27 pm

Post by pookie »


Are all these viruses known to originate from that site or something? How does it determine the URL to reference?
The site is gone now, but was a very legit computer security site in 1999. The url is just a reference for your information. It is in the attack signature database, when triggered it prints the url as an fyi. Here is an example ruleset for an Network Intrusion Detection System (NIDS);


alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg:"EXPLOIT ssh CRC32 overflow /bin/sh"; flow:to_server,
established; content:"/bin/sh"; reference:bugtraq,2347; reference:cve,2001-0144; reference:cve,2001-05
72; classtype:shellcode-detect; sid:1324; rev:6;)

Basically what this says, is if the NIDS sees an external host attempt to connect to port 22 to any host on my network and sees a "/bin/sh" in the re-assembled stream, it should flag the traffic and
reference bugtraq id 2347 (among others). That is this exploit;

http://www.securityfocus.com/bid/2347

which I found by typing 2347 in the securityfocus search bar.

Whitehats is just an old informational site, which makes me think your firewall has an old, highly forked version of gnu gpl'ed software running on it. The Whitehats database was called arachnids and was referenced by snort and the dragon sensors. The latest reference to it I could find was one from 2000, asking if anyone had a copy of it.

http://archives.neohapsis.com/archives/ ... /0256.html

No one uses it anymore, they reference to bugtraq, Common Vulnerabilities and Exposures (CVE), or CERT, often all three.
edit: And all the IPs are from different locations, and on different providers. Just a few at random:


It's not like I was getting DDOS'd because there isn't a heavy enough volume of hits for that.

It looks like a bunch of script kiddies trying to hit my IP (among many others I'm sure) with these trojans - although I did notice two that look like IRC servers. But were all these trojans created by that guy's company or something?
Some of these are false positives, some of them kids, but most are scanning bots. They scan machines in huge ip blocks pseudo-randomly usually looking for one open port. If the port reports back open, the bot launches an attack. Old attacks work because there will always be some machines running old unpatched software. Though these would be very long in the tooth.

These bots are common and in fact, if you look at the work the honeynet project has performed;

http://www.honeynet.org/

you will see that that most unpatched hosts last 5- 10 minutes on the internet. BTW, you will never see a url in an attack report only the ip, because performing dns lookups during a DDoS would close down your connection as well.

EDIT, I forgot to mention the most common means of controlling botnets is via irc. So don't be surprised that someone's irc server was compromised.
Dr_Watson
Posts: 5237
Joined: Wed Feb 23, 2000 8:00 am

Post by Dr_Watson »

seremtan wrote:what firewall is this?
the firewall i'm using is on my OpenBSD web-proxy machine.
this is just from safepeer; torrent plugin for azureus... so the fuzz doesn't get all up in my shit for torrent activity.
so far its been pretty effective... only gotten one complaint to my ISP, and my isp was nice enough to forward me the email, complete with the address of the originator. So i looked up thier domain and added their entire block to the safepeer database. (some wacko 3rd party anti-piracy agency) so they won't be bothering too many people anymore.

I just think its funny when i see people trying to connect to me from zany locations. Its funny to see addresses for corporate networks trying to warez episodes of southpark at work too.
(the presedente of kuwaitt must have been trying to get "the new devil in miss jones" ... since i think thats the only thing i was seeding at the time)
andyman
Posts: 11198
Joined: Wed Feb 09, 2005 8:20 pm

Post by andyman »

pookie wrote:

Are all these viruses known to originate from that site or something? How does it determine the URL to reference?
The site is gone now, but was a very legit computer security site in 1999. The url is just a reference for your information. It is in the attack signature database, when triggered it prints the url as an fyi. Here is an example ruleset for an Network Intrusion Detection System (NIDS);


alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg:"EXPLOIT ssh CRC32 overflow /bin/sh"; flow:to_server,
established; content:"/bin/sh"; reference:bugtraq,2347; reference:cve,2001-0144; reference:cve,2001-05
72; classtype:shellcode-detect; sid:1324; rev:6;)

Basically what this says, is if the NIDS sees an external host attempt to connect to port 22 to any host on my network and sees a "/bin/sh" in the re-assembled stream, it should flag the traffic and
reference bugtraq id 2347 (among others). That is this exploit;

http://www.securityfocus.com/bid/2347

which I found by typing 2347 in the securityfocus search bar.

Whitehats is just an old informational site, which makes me think your firewall has an old, highly forked version of gnu gpl'ed software running on it. The Whitehats database was called arachnids and was referenced by snort and the dragon sensors. The latest reference to it I could find was one from 2000, asking if anyone had a copy of it.

http://archives.neohapsis.com/archives/ ... /0256.html

No one uses it anymore, they reference to bugtraq, Common Vulnerabilities and Exposures (CVE), or CERT, often all three.
edit: And all the IPs are from different locations, and on different providers. Just a few at random:


It's not like I was getting DDOS'd because there isn't a heavy enough volume of hits for that.

It looks like a bunch of script kiddies trying to hit my IP (among many others I'm sure) with these trojans - although I did notice two that look like IRC servers. But were all these trojans created by that guy's company or something?
Some of these are false positives, some of them kids, but most are scanning bots. They scan machines in huge ip blocks pseudo-randomly usually looking for one open port. If the port reports back open, the bot launches an attack. Old attacks work because there will always be some machines running old unpatched software. Though these would be very long in the tooth.

These bots are common and in fact, if you look at the work the honeynet project has performed;

http://www.honeynet.org/

you will see that that most unpatched hosts last 5- 10 minutes on the internet. BTW, you will never see a url in an attack report only the ip, because performing dns lookups during a DDoS would close down your connection as well.

EDIT, I forgot to mention the most common means of controlling botnets is via irc. So don't be surprised that someone's irc server was compromised.

your new avatar: Image
sliver
Posts: 898
Joined: Fri May 06, 2005 12:25 am

Post by sliver »

Grudge wrote:|33t H4XX0rZ
who even takes the time to type that any more? Welcome to Y2K.
pookie
Posts: 46
Joined: Tue Oct 18, 2005 9:27 pm

Post by pookie »

andyman wrote: your new avatar: Image
LOL
:paranoid:
Post Reply