Is anyone else seeing the same type of traffic listed below?


The traffic implies one of the following:

1.                   Trojan/virus/worm

2.                   Hacked access using an internal system as waypoint

3.                   Internal hacker (employee or guest)

4.                   Portal vulnerability - netmeeting, IM...



If I did not know better, I would say this was Nimda traffic.



Strangely enough, the traffic has not returned. I have personally
scanned all systems, verified every system is current and checked the
logs - NOTHING.



I am fairly tightly locked down and have a three tiered AV solution. All
scans come up 100% clean; neither real-time, manual, nor online scans
show any infection(s) that would explain this. My anti-spyware software
finds nothing either.



With all internal systems checked and rechecked, the only other
possibility would be vulnerability at the firewall.



I had some RDP tunnels open, but have since closed them (no change).



Is anyone aware of ANY means of producing this traffic I may have
overlooked???



Thanks,



Danny



ALARM NO: 2

          DATE: Thu 2004-01-22 18:55:22 GMT

     INTERFACE: Protected (xl0)

INTERFACE TYPE: Protected

    ALARM TYPE: Possible spoof

     IP PACKET: TCP  [101.138.48.144/1707]-->[64.35.110.11/80]  l=0
f=0x2

                    [101.138.48.144/1707]-->[64.35.110.11/http]



DETAILED DESCRIPTION:

      Return interface for IP packet is different than arrival.



------------------------------------------------------------------------
-----



      ALARM NO: 3

          DATE: Thu 2004-01-22 18:55:22 GMT

     INTERFACE: Protected (xl0)

INTERFACE TYPE: Protected

    ALARM TYPE: Possible spoof

     IP PACKET: TCP  [1.210.252.124/1295]-->[62.140.213.144/80]  l=0
f=0x2

                    [1.210.252.124/1295]-->[web2.vnunet.com/http]



DETAILED DESCRIPTION:

      Return interface for IP packet is different than arrival.



------------------------------------------------------------------------
-----



      ALARM NO: 4

          DATE: Thu 2004-01-22 18:55:22 GMT

     INTERFACE: Protected (xl0)

INTERFACE TYPE: Protected

    ALARM TYPE: Possible spoof

     IP PACKET: TCP  [211.226.166.239/1033]-->[62.140.213.141/80]  l=0
f=0x2

                    [211.226.166.239/1033]-->[web1.vnunet.com/http]



DETAILED DESCRIPTION:

      Return interface for IP packet is different than arrival.



------------------------------------------------------------------------
-----



      ALARM NO: 5

          DATE: Thu 2004-01-22 18:55:22 GMT

     INTERFACE: Protected (xl0)

INTERFACE TYPE: Protected

    ALARM TYPE: Possible spoof

     IP PACKET: TCP  [211.226.166.239/1033]-->[62.140.213.144/80]  l=0
f=0x2

                    [211.226.166.239/1033]-->[web2.vnunet.com/http]



DETAILED DESCRIPTION:

      Return interface for IP packet is different than arrival.



------------------------------------------------------------------------
-----

------------------------------------------------------
To unsubscribe:           [EMAIL PROTECTED]
For additional commands:         [EMAIL PROTECTED]
Archive:  http://archives.gnatbox.com/gb-users/

Reply via email to