Royans: On Mon, Feb 17, 2003 at 08:00:31PM -0800, Royans Tharakan wrote: > We have all been looking for activity on 17300. I have a honeypot > running on this port which promptly ACKed back on that port. The probe > promptly returned within 10 seconds with a second probe. I am running ACK_hole on TCP:17300. I've seen little activity lately; most recently 02/07/03. Most probes I see are spaced at about 5 to 40 seconds, SYN, ACK, RST. > Its common to get RSTs back from attacking host, which we in the > intrusion community have been dismissing as responses from spoofed > address. However I did have a second TCP probe from the same server > which throws that idea away. The only (one!) probe I've seen with both source and destination of 17300 has the form SYN, RST. The probing host returns immediately from source port 3882 with SYN, ACK, ten seconds, ACK, FIN, and then another ACK. All other probes have had a more "normal" source port in the range 1000-5000. > Its normal for most OS to send an RST on a SYN-ACKs which is not > initiated by it (or if the SYN is crafted by a tool running on it), so > I was tempted to say that RST here was generated by the source host > after I sent the SYN-ACK of the first packet. But the fingerprint of > the second probe doesn't match the RST of the first probe, leading me > to believe that this was either generated by its firewall, or by the > tool itself to force our logs to believe that this was a reply from > spoofed address. Here, the first SYN (source port 17300) has the following form: ------------------------------------------------------------------------------ #(622 - 25) [2003-01-25 14:02:48] TCP inbound to 17300 Kuang2 IPv4: 216.40.243.24 -> 12.82.131.186 hlen=5 TOS=0 dlen=40 ID=53028 flags=0 offset=0 TTL=110 chksum=8798 TCP: port=17300 -> dport: 17300 flags=******S* seq=139324875 ack=729646487 off=5 res=0 win=51098 urp=0 chksum=24228 Payload: none ------------------------------------------------------------------------------ while the second SYN (source port 3882) has the form: ------------------------------------------------------------------------------ #(622 - 27) [2003-01-25 14:02:49] TCP inbound to 17300 Kuang2 IPv4: 216.40.243.24 -> 12.82.131.186 hlen=5 TOS=0 dlen=60 ID=14703 flags=0 offset=0 TTL=51 chksum=45823 TCP: port=3882 -> dport: 17300 flags=******S* seq=286060836 ack=0 off=10 res=0 win=32120 urp=0 chksum=26176 Options: #1 - MSS len=4 data=05B4 #2 - SACKOK len=0 #3 - TS len=10 data=0016B3FB00000000 #4 - NOP len=0 #5 - WS len=3 data=00 Payload: none ------------------------------------------------------------------------------ Notice the time delta of one second; no TCP options versus 5; very different IP ID's; very different TTL's; very different SEQ's; that the first is ACK'ing "729646487" which is nonsense in a SYN; that there are very different window advertisements. > There are significant fingerprinting differences between the first > probe and second probe. Its easy to figure out that the first probe is > actually crafted, but the difference between first and second packet > of the first probe can uniquely fingerprint this tool anywhere else on > the internet. The TTL differs by 11 hops... and I'm tempted to bet > that this could be bug in this attacking tool. > > BTW, can someone tell me the importance of "Window Scale=0" ? wscale is a TCP option that "..increases the definition of the TCP window from 16 to 32 bits...Instead of changing the TCP header [itself] to accomodate the larger window, the header still holds a 16 bit value, and an option is defined that applies a scaling operation to the 16-bit value..." WR Stevens, "TCP/IP Illustrated" vol 1, p 347 I'd say this has no great significance. > Here is some more info... and the packet dump itself. > > 1. TTL changes from 113 to 244 between a Syn and a Rset in the first probe Yes. Mine: TTL 110 to 242 between SYN and RST.. > 2. IP ID is very different between Syn and RST of the first probe. Yes. > 3. However IPID is sequential in the second probe > 4. The remote site ACKs my SYN-ACK and waits for reply from the victim host. > 5. Fingerprint of first probe > Window size of the first packet is 0xC23C > TTL 113,244 (+11 is the hops I counted to that system) = 124,255 > IPID is random (or 2 different systems, or crafted) > 6. Fingerprints of second probe > window size of the second packet is 0x7D78 Yes. My second SYN from src port 3882 is this: [toot@sparky ~]# 2 hd 7D78 = 32120 decimal > TTL 53 (11 is the hops I counted to that system) = 64 My second SYN from src port 3882 has a TTL of 51.. > SACKOK > TS 317697848 > WS 0 Grand total overall I've seen: 101 total since 04/06/02. I had a *real* big burst from multiple hosts 08/05/02; a few in September, and then nothing until December 25. Here are my captures since the recent increase in activity, after 12/25/02: Generated by ACID v0.9.6b21 on Mon February 17, 2003 22:46:13 ------------------------------------------------------------------------------ #(575 - 166) [2002-12-25 11:01:32] TCP inbound to 17300 Kuang2 IPv4: 24.28.142.23 -> 12.82.128.80 hlen=5 TOS=0 dlen=48 ID=22259 flags=0 offset=0 TTL=112 chksum=33023 TCP: port=2295 -> dport: 17300 flags=******S* seq=17094016 ack=0 off=7 res=0 win=32768 urp=0 chksum=44345 Options: #1 - MSS len=4 data=05B4 #2 - NOP len=0 #3 - NOP len=0 #4 - SACKOK len=0 Payload: none ------------------------------------------------------------------------------ #(575 - 167) [2002-12-25 11:01:33] TCP inbound to 17300 Kuang2 IPv4: 24.28.142.23 -> 12.82.128.80 hlen=5 TOS=0 dlen=40 ID=32499 flags=0 offset=0 TTL=112 chksum=22791 TCP: port=2295 -> dport: 17300 flags=***A**** seq=17094017 ack=3273459440 off=5 res=0 win=32768 urp=0 chksum=4064 Payload: none ------------------------------------------------------------------------------ #(575 - 168) [2002-12-25 11:01:36] TCP inbound to 17300 Kuang2 IPv4: 24.28.142.23 -> 12.82.128.80 hlen=5 TOS=0 dlen=40 ID=54771 flags=0 offset=0 TTL=112 chksum=519 TCP: port=2295 -> dport: 17300 flags=*****R** seq=17094017 ack=3394151851 off=5 res=0 win=0 urp=0 chksum=59903 Payload: none ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ #(188 - 36) [2002-12-31 23:49:45] TCP inbound to 17300 Kuang2 IPv4: 24.141.211.244 -> 12.82.129.14 hlen=5 TOS=0 dlen=48 ID=33957 flags=0 offset=0 TTL=111 chksum=3393 TCP: port=2150 -> dport: 17300 flags=******S* seq=4246163840 ack=0 off=7 res=0 win=16384 urp=0 chksum=11947 Options: #1 - MSS len=4 data=05B4 #2 - NOP len=0 #3 - NOP len=0 #4 - SACKOK len=0 Payload: none ------------------------------------------------------------------------------ #(188 - 37) [2002-12-31 23:49:45] TCP inbound to 17300 Kuang2 IPv4: 24.141.211.244 -> 12.82.129.14 hlen=5 TOS=0 dlen=40 ID=34200 flags=0 offset=0 TTL=111 chksum=3158 TCP: port=2150 -> dport: 17300 flags=***A**** seq=4246163841 ack=2329939848 off=5 res=0 win=17520 urp=0 chksum=48262 Payload: none ------------------------------------------------------------------------------ #(188 - 38) [2002-12-31 23:49:48] TCP inbound to 17300 Kuang2 IPv4: 24.141.211.244 -> 12.82.129.14 hlen=5 TOS=0 dlen=40 ID=34490 flags=0 offset=0 TTL=111 chksum=2868 TCP: port=2150 -> dport: 17300 flags=*****R** seq=4246163841 ack=0 off=5 res=0 win=0 urp=56901 chksum=48421 Payload: none ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ #(188 - 42) [2003-01-01 00:00:42] TCP inbound to 17300 Kuang2 IPv4: 24.210.144.37 -> 12.82.129.14 hlen=5 TOS=0 dlen=48 ID=61975 flags=0 offset=0 TTL=49 chksum=8537 TCP: port=1514 -> dport: 17300 flags=******S* seq=5303038 ack=0 off=7 res=0 win=59680 urp=0 chksum=11994 Options: #1 - MSS len=4 data=05B4 #2 - NOP len=0 #3 - NOP len=0 #4 - SACKOK len=0 Payload: none ------------------------------------------------------------------------------ #(188 - 43) [2003-01-01 00:00:43] TCP inbound to 17300 Kuang2 IPv4: 24.210.144.37 -> 12.82.129.14 hlen=5 TOS=0 dlen=40 ID=62231 flags=0 offset=0 TTL=49 chksum=8289 TCP: port=1514 -> dport: 17300 flags=***A**** seq=5303039 ack=3030841619 off=5 res=0 win=59680 urp=0 chksum=44499 Payload: none ------------------------------------------------------------------------------ #(188 - 45) [2003-01-01 00:01:26] TCP inbound to 17300 Kuang2 IPv4: 24.210.144.37 -> 12.82.129.14 hlen=5 TOS=0 dlen=40 ID=5656 flags=0 offset=0 TTL=49 chksum=64864 TCP: port=1514 -> dport: 17300 flags=*****R** seq=5303039 ack=3133846692 off=5 res=0 win=0 urp=0 chksum=54603 Payload: none ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ #(188 - 46) [2003-01-01 00:03:03] TCP inbound to 17300 Kuang2 IPv4: 24.210.144.37 -> 12.82.129.14 hlen=5 TOS=0 dlen=48 ID=23064 flags=0 offset=0 TTL=49 chksum=47448 TCP: port=1518 -> dport: 17300 flags=******S* seq=5443855 ack=0 off=7 res=0 win=59680 urp=0 chksum=2243 Options: #1 - MSS len=4 data=05B4 #2 - NOP len=0 #3 - NOP len=0 #4 - SACKOK len=0 Payload: none ------------------------------------------------------------------------------ #(188 - 47) [2003-01-01 00:03:03] TCP inbound to 17300 Kuang2 IPv4: 24.210.144.37 -> 12.82.129.14 hlen=5 TOS=0 dlen=40 ID=23576 flags=0 offset=0 TTL=49 chksum=46944 TCP: port=1518 -> dport: 17300 flags=***A**** seq=5443856 ack=3179438836 off=5 res=0 win=59680 urp=0 chksum=5376 Payload: none ------------------------------------------------------------------------------ #(188 - 48) [2003-01-01 00:04:00] TCP inbound to 17300 Kuang2 IPv4: 24.210.144.37 -> 12.82.129.14 hlen=5 TOS=0 dlen=40 ID=38168 flags=0 offset=0 TTL=49 chksum=32352 TCP: port=1518 -> dport: 17300 flags=*****R** seq=5443856 ack=1535738692 off=5 res=0 win=0 urp=0 chksum=16342 Payload: none ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ #(562 - 435) [2003-01-04 19:22:49] TCP inbound to 17300 Kuang2 IPv4: 24.82.93.34 -> 12.82.128.136 hlen=5 TOS=0 dlen=48 ID=18698 flags=0 offset=0 TTL=113 chksum=48751 TCP: port=2448 -> dport: 17300 flags=******S* seq=3983326971 ack=0 off=7 res=0 win=16384 urp=771 chksum=17473 Options: #1 - MSS len=4 data=05B4 #2 - NOP len=0 #3 - NOP len=0 #4 - SACKOK len=0 Payload: none ------------------------------------------------------------------------------ #(562 - 436) [2003-01-04 19:22:50] TCP inbound to 17300 Kuang2 IPv4: 24.82.93.34 -> 12.82.128.136 hlen=5 TOS=0 dlen=40 ID=18821 flags=0 offset=0 TTL=113 chksum=48636 TCP: port=2448 -> dport: 17300 flags=***A**** seq=3983326972 ack=2455523879 off=5 res=0 win=17520 urp=771 chksum=34817 Payload: none ------------------------------------------------------------------------------ #(562 - 437) [2003-01-04 19:22:53] TCP inbound to 17300 Kuang2 IPv4: 24.82.93.34 -> 12.82.128.136 hlen=5 TOS=0 dlen=40 ID=19192 flags=0 offset=0 TTL=113 chksum=48265 TCP: port=2448 -> dport: 17300 flags=*****R** seq=3983326972 ack=0 off=5 res=0 win=0 urp=0 chksum=46084 Payload: none ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ #(562 - 441) [2003-01-04 19:30:41] TCP inbound to 17300 Kuang2 IPv4: 62.137.118.162 -> 12.82.128.136 hlen=5 TOS=0 dlen=48 ID=37856 flags=0 offset=0 TTL=111 chksum=13794 TCP: port=3301 -> dport: 17300 flags=******S* seq=813358970 ack=0 off=7 res=0 win=8760 urp=0 chksum=48755 Options: #1 - MSS len=4 data=05B4 #2 - NOP len=0 #3 - NOP len=0 #4 - SACKOK len=0 Payload: none ------------------------------------------------------------------------------ #(562 - 442) [2003-01-04 19:30:42] TCP inbound to 17300 Kuang2 IPv4: 62.137.118.162 -> 12.82.128.136 hlen=5 TOS=0 dlen=40 ID=37857 flags=0 offset=0 TTL=111 chksum=13801 TCP: port=3301 -> dport: 17300 flags=***A**** seq=813358971 ack=2964701948 off=5 res=0 win=8760 urp=0 chksum=30581 Payload: none ------------------------------------------------------------------------------ #(562 - 443) [2003-01-04 19:31:03] TCP inbound to 17300 Kuang2 IPv4: 62.137.118.162 -> 12.82.128.136 hlen=5 TOS=0 dlen=40 ID=37884 flags=0 offset=0 TTL=111 chksum=13774 TCP: port=3301 -> dport: 17300 flags=*****R** seq=813358971 ack=3102038754 off=5 res=0 win=0 urp=0 chksum=63907 Payload: none ------------------------------------------------------------------------------ Here's the only probe I've seen with a src port 17300: ------------------------------------------------------------------------------ #(622 - 25) [2003-01-25 14:02:48] TCP inbound to 17300 Kuang2 IPv4: 216.40.243.24 -> 12.82.131.186 hlen=5 TOS=0 dlen=40 ID=53028 flags=0 offset=0 TTL=110 chksum=8798 TCP: port=17300 -> dport: 17300 flags=******S* seq=139324875 ack=729646487 off=5 res=0 win=51098 urp=0 chksum=24228 Payload: none ------------------------------------------------------------------------------ #(622 - 26) [2003-01-25 14:02:49] TCP inbound to 17300 Kuang2 IPv4: 216.40.243.24 -> 12.82.131.186 hlen=5 TOS=0 dlen=40 ID=14696 flags=0 offset=0 TTL=242 chksum=13338 TCP: port=17300 -> dport: 17300 flags=*****R** seq=139324876 ack=0 off=5 res=0 win=0 urp=0 chksum=55120 Payload: none ------------------------------------------------------------------------------ #(622 - 27) [2003-01-25 14:02:49] TCP inbound to 17300 Kuang2 IPv4: 216.40.243.24 -> 12.82.131.186 hlen=5 TOS=0 dlen=60 ID=14703 flags=0 offset=0 TTL=51 chksum=45823 TCP: port=3882 -> dport: 17300 flags=******S* seq=286060836 ack=0 off=10 res=0 win=32120 urp=0 chksum=26176 Options: #1 - MSS len=4 data=05B4 #2 - SACKOK len=0 #3 - TS len=10 data=0016B3FB00000000 #4 - NOP len=0 #5 - WS len=3 data=00 Payload: none ------------------------------------------------------------------------------ #(622 - 28) [2003-01-25 14:02:49] TCP inbound to 17300 Kuang2 IPv4: 216.40.243.24 -> 12.82.131.186 hlen=5 TOS=0 dlen=52 ID=14711 flags=0 offset=0 TTL=51 chksum=45823 TCP: port=3882 -> dport: 17300 flags=***A**** seq=286060837 ack=3967778627 off=8 res=0 win=32120 urp=0 chksum=61445 Options: #1 - NOP len=0 #2 - NOP len=0 #3 - TS len=10 data=0016B4245878E08A Payload: none ------------------------------------------------------------------------------ #(622 - 29) [2003-01-25 14:02:59] TCP inbound to 17300 Kuang2 IPv4: 216.40.243.24 -> 12.82.131.186 hlen=5 TOS=0 dlen=52 ID=15135 flags=0 offset=0 TTL=51 chksum=45399 TCP: port=3882 -> dport: 17300 flags=***A***F seq=286060837 ack=3967778627 off=8 res=0 win=32120 urp=0 chksum=60434 Options: #1 - NOP len=0 #2 - NOP len=0 #3 - TS len=10 data=0016B8165878E08A Payload: none ------------------------------------------------------------------------------ #(622 - 30) [2003-01-25 14:02:59] TCP inbound to 17300 Kuang2 IPv4: 216.40.243.24 -> 12.82.131.186 hlen=5 TOS=0 dlen=52 ID=15150 flags=0 offset=0 TTL=51 chksum=45384 TCP: port=3882 -> dport: 17300 flags=***A**** seq=286060838 ack=3967778628 off=8 res=0 win=32120 urp=0 chksum=59360 Options: #1 - NOP len=0 #2 - NOP len=0 #3 - TS len=10 data=0016B82F5878E4A2 Payload: none ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ #(641 - 140) [2003-02-07 21:42:48] TCP inbound to 17300 Kuang2 IPv4: 218.157.164.94 -> 12.82.129.203 hlen=5 TOS=0 dlen=48 ID=33864 flags=0 offset=0 TTL=112 chksum=31078 TCP: port=1657 -> dport: 17300 flags=******S* seq=879043774 ack=0 off=7 res=0 win=16384 urp=0 chksum=37619 Options: #1 - MSS len=4 data=0596 #2 - NOP len=0 #3 - NOP len=0 #4 - SACKOK len=0 Payload: none ------------------------------------------------------------------------------ #(641 - 141) [2003-02-07 21:42:49] TCP inbound to 17300 Kuang2 IPv4: 218.157.164.94 -> 12.82.129.203 hlen=5 TOS=0 dlen=48 ID=33895 flags=0 offset=0 TTL=112 chksum=31047 TCP: port=1657 -> dport: 17300 flags=******S* seq=879043774 ack=0 off=7 res=0 win=16384 urp=0 chksum=37619 Options: #1 - MSS len=4 data=0596 #2 - NOP len=0 #3 - NOP len=0 #4 - SACKOK len=0 Payload: none ------------------------------------------------------------------------------ #(641 - 142) [2003-02-07 21:42:52] TCP inbound to 17300 Kuang2 IPv4: 218.157.164.94 -> 12.82.129.203 hlen=5 TOS=0 dlen=48 ID=33928 flags=0 offset=0 TTL=112 chksum=31014 TCP: port=1657 -> dport: 17300 flags=******S* seq=879043774 ack=0 off=7 res=0 win=16384 urp=0 chksum=37619 Options: #1 - MSS len=4 data=0596 #2 - NOP len=0 #3 - NOP len=0 #4 - SACKOK len=0 Payload: none ------------------------------------------------------------------------------ > -----Original Message----- > > > --------------- > 01:58:53.790082 204.42.204.151.17300 > 24.219.XX.XX.17300: S [tcp sum > ok] 490674844:490674844(0) win 49724 (ttl 113, id 21549, len 40) > 4500 0028 542d 0000 7106 39ae cc2a cc97 > 18db XXXX 4394 4394 1d3f 1a9c 0da5 8c9f > 5002 c23c d868 0000 0000 0000 0000 > > 01:58:53.798301 24.219.XX.XX.17300 > 204.42.204.151.17300: S [tcp sum > ok] 0:0(0) ack 490674845 win 65535 (DF) [tos 0x10] (ttl 64, id 0, len > 40) > 4510 0028 0000 4000 4006 7ecb 18db XXXX > cc2a cc97 4394 4394 0000 0000 1d3f 1a9d > 5012 ffff 34d9 0000 > > 01:58:53.908607 204.42.204.151.17300 > 24.219.XX.XX.17300: R [tcp sum > ok] 490674845:490674845(0) win 0 (ttl 244, id 48833, len 40) > 4500 0028 bec1 0000 f406 4c19 cc2a cc97 > 18db XXXX 4394 4394 1d3f 1a9d 0000 0000 > 5004 0000 34e7 0000 0000 0000 0000 > > 01:59:04.012423 204.42.204.151.2195 > 24.219.XX.XX.17300: S [tcp sum > ok] 31094744:31094744(0) win 32120 <mss 1460,sackOK,timestamp > 317697848 0,nop,wscale 0> (DF) (ttl 53, id 49933, len 60) > 4500 003c c30d 4000 3506 c6b9 cc2a cc97 > 18db XXXX 0893 4394 01da 77d8 0000 0000 > a002 7d78 8698 0000 0204 05b4 0402 080a > 12ef af38 0000 0000 0103 0300 > > 01:59:04.019866 24.219.XX.XX.17300 > 204.42.204.151.2195: S [tcp sum > ok] 0:0(0) ack 31094745 win 65535 (DF) [tos 0x10] (ttl 64, id 0, len > 40) > 4510 0028 0000 4000 4006 7ecb 18db XXXX > cc2a cc97 4394 0893 0000 0000 01da 77d9 > 5012 ffff 2e03 0000 > > 01:59:04.145460 204.42.204.151.2195 > 24.219.XX.XX.17300: . [tcp sum > ok] 31094745:31094745(0) ack 1 win 32120 (DF) (ttl 53, id 49945, len > 40) > 4500 0028 c319 4000 3506 c6c1 cc2a cc97 > 18db XXXX 0893 4394 01da 77d9 0000 0001 > 5010 7d78 b08b 0000 0000 0000 0000 > > 01:59:04.145596 24.219.XX.XX.17300 > 204.42.204.151.2195: R [tcp sum > ok] 1:1(0) win 0 (DF) (ttl 64, id 0, len 40) > 4500 0028 0000 4000 4006 7edb 18db XXXX > cc2a cc97 4394 0893 0000 0001 0000 0000 > 5004 0000 a7c3 0000 - John -- "You are in a little maze of twisty passages, all different." PGP key: http://www.finchhaven.com/pages/gpg_pubkey.html Fingerprint: C493 9F26 05A9 6497 9800 4EF6 5FC8 F23D 35A4 F705 ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Tue Feb 18 2003 - 10:43:38 PST