On Mon, 21 Jan 2002, Kyle R Maxwell wrote: > Jan 21 15:51:45 hostname snort: [1:230:1] DDOS shaft client to handler > [Classification: Attempted Denial of Service] [Priority: 2]: {TCP} > 216.227.124.82:76 -> x.x.x.x:20432 rick wash and myself did some analysis of the shaft node we found on our local LAN, which can be read here: http://biocserver.BIOC.CWRU.Edu/~jose/shaft_analysis/node-analysis.txt a large number of sites were found infected with this tool and most of them fit these parameters. note that since then the tool has been available publicly and may be installed differently. hope this helps, ____________________________ jose nazario joseat_private PGP: 89 B0 81 DA 5B FD 7E 00 99 C3 B2 CD 48 A0 07 80 PGP key ID 0xFD37F4E5 (pgp.mit.edu) ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Tue Jan 22 2002 - 12:08:08 PST