RE: DSL Modem or Router Cracked?

From: Klepinger, Aaron (Aaron.Klepingerat_private)
Date: Thu Jun 13 2002 - 09:07:21 PDT

  • Next message: Nate Campi: "Re: remote openssh probe or crack?."

    Looks like the logging on my router (192.168.1.1) is broadcasting to
    192.168.1.255 using SNMP and also for some reason UPnP is sending out
    packets.  I'll make sure to disable those and also just check the general
    configuration of my 192.168.1.2 box.
    
    What worried me was the amount of packets being sent to the same or similar
    address at a "high" (relative term!) rate.  My connection slowed
    significantly and I figured these packets might be the culprit.  I have also
    reconfigured my Alcatel modem with the defaults, so we'll see if that helps,
    too.  Looks like I have some work to do!  :)
    
    Thanks for everyone's help.  I got about 5 responses that were quite helpful
    and I highly appreciate the assistance.
    
    Aaron
    
    
    
    -----Original Message-----
    From: NESTING, DAVID M (SBCSI) [mailto:dn3723at_private]
    Sent: Thursday, June 13, 2002 11:53 AM
    To: 'incidentsat_private'
    Cc: 'Klepinger, Aaron'
    Subject: RE: DSL Modem or Router Cracked?
    
    
    What about this traffic alarms you specifically?
    
    The 192.168.1.1:5390 -> 192.168.1.255:162 is SNMP, maybe an SNMP trap being
    sent to your network's broadcast address (someone else can probably comment
    more specifically).  Check the configuration of the 192.168.1.1 device and
    turn SNMP off if you're not using it.
    
    The 192.168.1.1:1901 -> 239.255.255.250:1900 is "Universal Plug-and-Play"
    traffic.  The latter address is a multicast address reserved for this
    purpose.  It should remain local to your own network (i.e. not routed
    through your Internet link).
    
    205.152.37.254:53 is DNS for ns.asm.bellsouth.net (your ISP?).
    129.6.15.29:123 is NTP at time-b.nist.gov, probably a time synchronization
    tool running on 192.168.1.2.
    
    None of this looks alarming to me, at first glance.  What about it worries
    you?
    
    Though to be fair, there have been some vulnerabilities in the last few
    months related to SNMP and UPnP, so that traffic alone might be reason to
    take a closer look at your network, but I see no evidence of a compromise
    just yet.
    
    David
    
    
    ==================================================
    This message contains PRIVILEGED and CONFIDENTIAL
    information that is intended only for use by the named recipient.
    If you are not the named recipient, any disclosure, dissemination,
    or action based on the contents of this message is prohibited.
    In such case please notify us and destroy and delete all copies
    of this transmission.  Thank you.
    ==================================================
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Thu Jun 13 2002 - 14:30:53 PDT