Security Basics mailing list archives

RE: Port scan and scvhost overload


From: "Prodigi Child" <prodigi.child () gmail com>
Date: Thu, 16 Oct 2008 17:02:10 -0500

Only source addresses of 192.168.x.x are RFC 1918 addresses (private
addresses that are not routable on the Internet). If it was not 192.168.x.x
then it probably came from the Internet. Does their home LAN use a
192.168.x.x address range of is it a 10.x.x.x or 172.16-31.x.x address?

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On
Behalf Of reporting4booty () gmail com
Sent: Thursday, October 16, 2008 12:26 PM
To: security-basics () securityfocus com
Subject: Port scan and scvhost overload

My friends Vista operated laptop is receiving attempted entries to ports in
a series, starting with 4756 (at least when I was asked about the pop ups on
their computer). Their Sunbelt firewall pops up with the IP 192.XXX.XX.01.
(I am not with the computer at the moment so I do not remember the exact IP.
I have it written down in another building.) From past experience I get the
impression that all IPs with 192 in the beginning are on your own network.

My friend has two 14 year old twins that spend all day playing XBox and
computer games. I get the impression that they were just messing with their
sibling, pestering them with a ports can for fun. However in the process
list there is around 9 different instances of the svchost.exe process, from
what I was able to find out Before the laptop mysteriously shutdown, the
processes were using services such as plug-in-play and confidential
background transfer services (I am no computer guru, not yet at least, I am
not aware of the full use of Vista's services.). 

The siblings all use the same wireless network (Wi-Fi processes found in
process list) in the same house with virtually almost anytime physical
access.

What should I do to pinpoint the cooperate, remove their instillation if I
may call it, and keep them out for next time? Also, is there a way I can
find dump files or something of the sort that will give me a history of what
they have down while in access with the victim laptop? Perhaps I could find
records on their computer(s)? 

There are multiple computers in the house that all have access to the
wireless network. 3 laptops and 1 desktop. 

Also, if it means anything, while pursuing this suspicion I noticed 2 extra
randomly named networks within access range.


Current thread: