{"id":190,"date":"2009-11-24T18:21:11","date_gmt":"2009-11-24T22:21:11","guid":{"rendered":"http:\/\/www.braindeadprojects.com\/blog\/?p=190"},"modified":"2009-11-25T18:24:52","modified_gmt":"2009-11-25T22:24:52","slug":"chasing-ghosts-this-afternoon","status":"publish","type":"post","link":"http:\/\/www.braindeadprojects.com\/blog\/what\/chasing-ghosts-this-afternoon\/","title":{"rendered":"Chasing Ghosts this afternoon&#8230;"},"content":{"rendered":"<p>Starting yesterday evening, I&#8217;ve been noticing a LOT more attempted connections to :445 (tcp).<\/p>\n<p>Initially I was under the impression that the issue was isolated to the network I was on, although I&#8217;ve had confirmations from another non-related network (plus another host I have offnet) that :445 traffic is slightly higher than what is believed to be normal, but then again &#8211; what&#8217;s normal (without a good netflow collector and historical data, you probably have no idea)<\/p>\n<p>A quick scan of the DSL routers I have access to, shows 314 unique IPs originating such scans to multiple destinations (this is one quick run of &#8220;show ip cache flow\u00a0 | i\u00a0 01BD&#8221; on each of 3 routers). I&#8217;m seeing the same thing on a VPS host I have located in Virginia.<\/p>\n<p>Being a little more than curious, I&#8217;ve fired up <a href=\"http:\/\/nepenthes.carnivore.it\/\" target=\"_blank\">nepenthes<\/a> and within 8 minutes I had 3 SMB exploit attempts, where the affected machine tries to download <a href=\"http:\/\/www.threatexpert.com\/files\/myreceve.com.html\">&#8220;myreceve.com&#8221;<\/a><\/p>\n<p>These exploits were hitting vulnerabilities on :139 (tcp), however, and I don&#8217;t believe are related (also they&#8217;re from the same class B network)<\/p>\n<blockquote><p>66.xx.xx.xx -&gt; 66.xx.xx.xx ftp:\/\/1:1@66.xx.xx.xx:9015\/myreceve.com<\/p><\/blockquote>\n<p>Connecting to this host in particular gives a warm welcome:<\/p>\n<blockquote><p>nc 66.xx.xx.xx 9015<br \/>\n220 fuckFtpd 0wns j0<\/p><\/blockquote>\n<p>Back to what prompted my initial interest &#8211; :445, I can&#8217;t seem to figure out whats really going on &#8211; packet captures indicate more than a normal SYN scan, but without some additional review, I have no idea why so many requests from so many hosts identical to this:<\/p>\n<blockquote><p>NetBIOS Session Service<br \/>\nMessage Type: Session message<br \/>\nLength: 47<br \/>\nSMB (Server Message Block Protocol)<br \/>\nSMB Header<br \/>\nServer Component: SMB<br \/>\nSMB Command: Negotiate Protocol (0x72)<br \/>\nError Class: Success (0x00)<br \/>\nReserved: 00<br \/>\nError Code: No Error<br \/>\nFlags: 0x00<br \/>\nFlags2: 0x0000<br \/>\nProcess ID High: 0<br \/>\nSignature: 0000000000000000<br \/>\nReserved: 0000<br \/>\nTree ID: 0<br \/>\nProcess ID: 604<br \/>\nUser ID: 0<br \/>\nMultiplex ID: 0<br \/>\nNegotiate Protocol Request (0x72)<br \/>\nWord Count (WCT): 0<br \/>\nByte Count (BCC): 12<br \/>\nRequested Dialects<br \/>\nDialect: NT LM 0.12<br \/>\nBuffer Format: Dialect (2)<br \/>\nName: NT LM 0.12<\/p><\/blockquote>\n<p>I&#8217;ve only slightly glanced over other SMB sessions, and this seems like a normal request&#8230; I&#8217;m a little baffled as to why every pcap I have from an apparently compromised host uses process id &#8220;604&#8221;, but otherwise each request appears valid.<\/p>\n<p>So&#8230;. it&#8217;s probably nothing (usually is), but it definitely piqued my interest for a time today. Happy Thanksgiving!<\/p>\n<p><strong>Update at 22:25<\/strong><\/p>\n<p>At the advice of others, I&#8217;m installing <a href=\"http:\/\/dionaea.carnivore.it\/\">dionaea<\/a>, which apparently has better SMB support, to see if I can determine exactly what these connections are. I&#8217;ll post an update when I&#8217;m finished.<\/p>\n<p><strong>Update 06:00 11\/25\/2009<\/strong><\/p>\n<p>I&#8217;ve got dionea running and collecting bitstreams. Same basic signature (process id: 604), but now with a _lot_ more information in the captures (as dionaea is a little more fluent in the SMB protocol). Tonight: Cooking and reading pcaps.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Starting yesterday evening, I&#8217;ve been noticing a LOT more attempted connections to :445 (tcp). Initially I was under the impression that the issue was isolated to the network I was on, although I&#8217;ve had confirmations from another non-related network (plus another host I have offnet) that :445 traffic is slightly higher than what is believed &hellip; <a href=\"http:\/\/www.braindeadprojects.com\/blog\/what\/chasing-ghosts-this-afternoon\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Chasing Ghosts this afternoon&#8230;<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-190","post","type-post","status-publish","format-standard","hentry","category-what"],"_links":{"self":[{"href":"http:\/\/www.braindeadprojects.com\/blog\/wp-json\/wp\/v2\/posts\/190"}],"collection":[{"href":"http:\/\/www.braindeadprojects.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.braindeadprojects.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.braindeadprojects.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.braindeadprojects.com\/blog\/wp-json\/wp\/v2\/comments?post=190"}],"version-history":[{"count":10,"href":"http:\/\/www.braindeadprojects.com\/blog\/wp-json\/wp\/v2\/posts\/190\/revisions"}],"predecessor-version":[{"id":197,"href":"http:\/\/www.braindeadprojects.com\/blog\/wp-json\/wp\/v2\/posts\/190\/revisions\/197"}],"wp:attachment":[{"href":"http:\/\/www.braindeadprojects.com\/blog\/wp-json\/wp\/v2\/media?parent=190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.braindeadprojects.com\/blog\/wp-json\/wp\/v2\/categories?post=190"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.braindeadprojects.com\/blog\/wp-json\/wp\/v2\/tags?post=190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}