The below output represents a DoS attack that occurred last night.

Start             End                                   Sif    SrcIPaddress     
       SrcP  DIf         DstIPaddress    DstP    P Fl Pkts       Octets
0711.20:02:26.187 0711.20:02:26.187 29    attacker.ip.add.ress   0     27    
victim.ip.add.ress   0     33  0  1          1500
0711.20:02:26.223 0711.20:02:26.323 29    attacker.ip.add.ress   0     27    
victim.ip.add.ress   0     116 0  2          3000
0711.20:02:26.247 0711.20:02:26.247 29    attacker.ip.add.ress   0     27    
victim.ip.add.ress   0     94  0  1          1500
0711.20:02:26.247 0711.20:02:26.247 29    attacker.ip.add.ress   0     27    
victim.ip.add.ress   0     212 0  1          1500
0711.20:02:26.255 0711.20:02:26.255 29    attacker.ip.add.ress   0     27    
victim.ip.add.ress   0     146 0  1          1500
0711.20:02:26.271 0711.20:02:26.271 29    attacker.ip.add.ress   0     27    
victim.ip.add.ress   0     101 0  1          1500
0711.20:02:26.275 0711.20:02:26.275 29    attacker.ip.add.ress   0     27    
victim.ip.add.ress   0     60  0  1          1500
0711.20:02:26.335 0711.20:02:26.335 29    attacker.ip.add.ress   0     27    
victim.ip.add.ress   0     123 0  1          1500

Is this a "netflow thing" to show the source port/dst port as 0 or did they 
actually attack port 0? (or are they fragments?)

thanks,
-Drew

_______________________________________________
Flow-tools mailing list
[email protected]
http://mailman.splintered.net/mailman/listinfo/flow-tools

Reply via email to