Security Incidents mailing list archives
Re: FW: IP Spoofs in the log - not sure what to do next
From: David Hawley <rhino007_us () yahoo com>
Date: Tue, 22 Apr 2003 01:13:52 -0700
At 05:30 PM 4/21/2003 +0000, crawford charles wrote:
Is he terminating a tunnel? C.From: Chris Corbett [mailto:ccorbett () aspenwood com] Sent: Thursday, April 17, 2003 6:18 PM To: incidents () securityfocus org Subject: IP Spoofs in the log - not sure what to do next I have been observing this list for a while and believe this is the right forum for this post. If not, direct me elsewhere I am seeing a steady stream of IP Spoofs in a firewall log we track for a client. Here is a sample 04/16/2003 10:08:15.624 - IP spoof detected - Source:172.175.86.24, LAN- Destination:24.191.183.249, WAN - MAC address: 00.90.27.xx.xx.xx
Chris, I will provide some general thoughts, and others will no doubt narrow it down. Try and look at this "holistically" (from all 10 domains of network security). Physically it could be something that an application on that "phat mac" is doing, or initiated, perhaps at home over DSL. (such as a background picture exchange service, or even what I like to call a "denial of service pop-up application" virus.... those annoying programs that load onto a PC from HTML...)
---------------------Also holistically we know that there is a never-ending river of port scans, hacker attempts, "tests" by our Govt, experiments, etc across the Internet; 24/7 365 days a year (look on any hi profile firewall). So of course harden your firewalls (both Bastion Hosts and routers, remember to do the usual things like harden SNMP passwd's).
My last contract was with ATSSI.... I don't know how far they have come with their products or research, but we were looking for a suite of security software that floated above all other network devices and proactivly tuned the network (routers, firewalls, IDS, sacrificial lambs, internal servers, and hosts, for security based upon conditions at the time.
Don't forger the host security... C2 has been a reality for decades in UNIX, also B1 and even A systems... where is Windows?
LOL, david David R. Hawely, ceo/president, CISSP UNIX & NT NETWORK SECURITY, LLC WWW.123NETSECURITY.NET
All of the sources lead back to 172.128.x.x, 172.162.x.x, 172.138.x.x or 172.175.x.x which show up as AOL registered IP addresses (whois lookup) The destination addresses seem to be random, 24.191.183.249, 64.1.1.34, 216.160.20.203 .....nothing I can decipher as a pattern and nothing close to the network this firewall is "protecting". The MAC address listed in the spoof is the same every time, ironically an Apple computer on this network. This user (on the Apple) will occasionally use AOL mail via the web (I can't stop them), but they are not using AOL as their ISP. It's a DSL circuit and ISP services from another provider. I am still learning about IP Spoofing and I don't want to overreact, but from what I read, spoofs should be investigated further and I am at a point where I am not sure what to look at next. The spoof is being detected by the firewall and therefore denied, but what else should I be looking for to make sure this is harmless? Is it someone trying to use this network to spoof another network? Could it be possible that this Apple machine is being compromised in some way and being used for spoof attempts? Chris Corbett Aspenwood Technologies, LTD ccorbett () aspenwood com Denver, CO Chris Corbett Aspenwood Technologies, LTD Denver, CO 303-733-0044 x 303 303-733-4466 ---------------------------------------------------------------------------- Attend Black Hat Briefings & Training Europe, May 12-15 in Amsterdam, the world's premier event for IT and network security experts. The two-day Training features 6 hand-on courses on May 12-13 taught by professionals. The two-day Briefings on May 14-15 features 24 top speakers with no vendor sales pitches. Deadline for the best rates is April 25. Register today to ensure your place. http://www.securityfocus.com/BlackHat-incidents ----------------------------------------------------------------------------_________________________________________________________________Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail----------------------------------------------------------------------------Attend Black Hat Briefings & Training Europe, May 12-15 in Amsterdam, the world's premier event for IT and network security experts. The two-day Training features 6 hand-on courses on May 12-13 taught by professionals. The two-day Briefings on May 14-15 features 24 top speakers with no vendor sales pitches. Deadline for the best rates is April 25. Register today to ensure your place. http://www.securityfocus.com/BlackHat-incidents ----------------------------------------------------------------------------
----------------------------------------------------------------------------Attend Black Hat Briefings & Training Europe, May 12-15 in Amsterdam, the world's premier event for IT and network security experts. The two-day Training features 6 hand-on courses on May 12-13 taught by professionals. The two-day Briefings on May 14-15 features 24 top speakers with no vendor sales pitches. Deadline for the best rates is April 25. Register today to ensure your place. http://www.securityfocus.com/BlackHat-incidents ----------------------------------------------------------------------------
Current thread:
- IP Spoofs in the log - not sure what to do next Chris Corbett (Apr 19)
- RE: IP Spoofs in the log - not sure what to do next Curt Purdy (Apr 21)
- RE: IP Spoofs in the log - not sure what to do next David Klotz (Apr 21)
- <Possible follow-ups>
- Re: FW: IP Spoofs in the log - not sure what to do next crawford charles (Apr 21)
- Re: FW: IP Spoofs in the log - not sure what to do next David Hawley (Apr 22)
- Re: IP Spoofs in the log - not sure what to do next aladin168 (Apr 24)