netbios vuln

From: ohnononoat_private
Date: Fri Dec 06 2002 - 06:50:02 PST

  • Next message: Jerry Shenk: "RE: A small quandary"

    -----BEGIN PGP SIGNED MESSAGE-----
    
    I posted this question to the list 3 weeks ago but the moderator failed to act on my post and thus it was returned to me.  I have been a ridicilious amount of netbios traffic at my main firewall.  This morning I read this article.  It seems to hint at a way to run arbitarty code via netbios, now my question is does anyone know anything about this; is anyone seeing the netbios traffic and finally is it just the author of the article (who is not a security writer like a brian mcwillaims or a thomas greene) didnt really understand what was going on?  This was from the securitynewsportal site.
    
    Thanks
    
    A teenage hacker attacked an online chatroom run by The Edge radio station and then turned his attention to TV3's website. The 15-year-old, who goes by the online name of "deejay-fuzion" and attends Roturua Lakes High School, rang the Herald to brag about his exploits. Asked why he launched a "DDOS" (distributed denial of service) attack against the chatroom on Monday night, he said: "Because the administrator was ... just being a smart arse." "Dj-fu" signalled his "bots" to flood the chatroom computer with spurious internet traffic, causing the server to slow down and eventually stop.   During the process he noticed other servers belonging to TV3 were in the same proximity so he tried his attack on TV3's website - "just because I could". (Radioworks, which owns the Edge, and TV3 have the parent company CanWest).   TV3 communications manager Roger Beaumont confirmed The Edge chat server had a DDOS attack and was offline for a short period. But he said it was coincidence that 
     TV3's website was offline on Tuesday for routine maintenance. Will Steele, a friend of the 15-year-old who was online at the time, said the TV3 site was unavailable during the attack and the "routine maintenance" message appeared on the site after the attack ended at 9.45pm. That was when the hacker was taken offline by his internet provider, Quicksilver.
    
    Its network manager Mark Frater said two individuals were disconnected on Monday night after the internet provider received a complaint from a server administrator. When contacted by Quicksilver, both denied knowledge of an attack and had their internet accounts reinstated. Quicksilver manager Trevor Isted said there was no proof to link the pair to the attack. Usage logs were being investigated, and if evidence was found, the pair would be banned from access for breaching the internet provider's acceptable use policy. The teenager claims to have written a trojan program called "FB3" with a friend known online as "lynx". The program exploits a "Netbios" vulnerability in Windows PCs related to file and print sharing, to plant itself on unsuspecting users' computers. The infected computers (bots - short for robots) signal their presence to a computer in the United States which the teenager uses to send out the instructions to attack. In this case the method of attack was a "SYN
      flood" - an efficient process which fakes the initial handshake of an internet connection with false addresses which the target Machine is unable to answer.  It keeps retrying to accept them, and with enough of these happening, a server can become overwhelmed.   New anti-hacking provisions - including clauses covering DDOS attacks - in the Crimes Amendment Bill are waiting to be introduced to Parliament.    But the hacker would be immune from prosecution because he is only 15
    -----BEGIN PGP SIGNATURE-----
    Version: Hush 2.2 (Java)
    Note: This signature can be verified at https://www.hushtools.com/verify
    
    wl0EARECAB0FAj3wuNMWHG9obm9ub25vQGh1c2htYWlsLmNvbQAKCRAuXN+1lPsfqSgh
    AJ9KSph4ZPYS+x9o8iWlsdJy11TBcwCgmGYUvx4bjHy7/bOxVWtjDrZ/54o=
    =JfiS
    -----END PGP SIGNATURE-----
    
    
    
    
    Concerned about your privacy? Follow this link to get
    FREE encrypted email: https://www.hushmail.com/?l=2 
    
    Big $$$ to be made with the HushMail Affiliate Program: 
    https://www.hushmail.com/about.php?subloc=affiliate&l=427
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Sun Dec 08 2002 - 19:21:09 PST