[prev in list] [next in list] [prev in thread] [next in thread]
List: incidents
Subject: Re: Smurf Broadcast DoS attack
From: Avleen Vig <incidenthandling () ivision ! co ! uk>
Date: 2001-08-24 14:46:06
[Download RAW message or body]
Please have a look at:
http://www.ircnetops.org/smurf
It's the home page of the SAFE project which I run. Can you see if any
of the IP addresses that attacked you are in the database?
If they are I will jump on the admins. They've been told at least twice
that most of them are running open amplifiers.
Thanks,
Avleen Vig
On Thu, Aug 23, 2001 at 12:35:14PM +0200, X wrote:
>
> Hello,
>
> Yesterday, one of the servers I admin. was attacked by a broadcast massive
> ICMP's. The typical 'smurf' attack.
>
> I am working on discover who did it:
>
> During the attack, I loaded tcpdump and redirected its output to a
> logfile to study and analyze it later.
>
> Once I had the log at my hands, I took perl interpreter and wrote several
> scripts to search some evidence, like ICMPs made from the attacker to test
> the ping response or with other words, to know the sharpness of his/her
> attack.
>
> All the IP's that sent the ICMP packets, were not alone, I mean that they
> were in a serie of IP's, that is: B, C internet network classes -->
> broadcasts. All of them were from other countries. I continued looking for
> some evidence.
>
> I found a clue when I saw some ICMP echo's to the victim's IP coming from
> a national ISP. That is a subscriber IP from that ISP, perhaps the
> attacker.
>
> I think that way because if I was the attacker, I would make some ping
> to the victim to see if he is knocked out. Perhaps the attacker didn't
> think that I was logging, or that I would be unable to find his IP.
>
> I have to tell you that the attacked server has not any service, it is not
> known by anyone. I use it to develop and test software. It is an old
> SGI Indigo 2. So it has not any traffic to/from outside my network. That
> brings me to suspect that this national-ISP IP was the attacker.
>
> I attach to this mail the list of IP's, some of them resolved, that sent
> the broad ICMPs.
> I contacted my frame-relay provider and sent them the details of the
> attack.
> I also contacted the suspect ISP and told them that IP and the hour it
> happened.
>
> This mail could open a discussion about the Internet insecurity, how to
> avoid this attacks, possible solutions, possible ways to analyze the
> results.
>
> Nothing more,
>
> luck!
>
>
> --
>
> Xavi Torres <admin@area66.com>
> Administración de sistemas
> Krypton Networks S.L.
> http://www.kryptonetworks.com/
> http://www.area66.com/
>
>
> ----------------------------------------------------------------------------
> This list is provided by the SecurityFocus ARIS analyzer service.
> For more information on this free incident handling, management
> and tracking system please see: http://aris.securityfocus.com
>
>
--
--
Avleen Vig, Systems Administrator
Email: avleen@ivision.co.uk Mobile: (07974) 100 573
Internet Vision Tel: 020 7589 4500
60 Albert Court Fax: 020 7589 4522
Prince Consort Road info@ivision.co.uk
London. SW7 2BE http://www.ivision.co.uk/
----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management
and tracking system please see: http://aris.securityfocus.com
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic