2013/3/19 Chuck Mariotti <cmario...@xunity.com> > < It's effectively impossible to blind spoof TCP, so since you're > completing the TCP session you can be assured the traffic is really coming > from where it claims to be. > < > < Is it a high rate from a smallish number of IPs, or a low rate from a > large number? What specifically do the HTTP requests look like? > < Getting full packet captures and examining the REFERER and other parts > of the HTTP request may at least lead you to an explanation of why it's > happening and a better understanding of what's happening, at which point > you can implement mitigation if necessary or < feasible. > < This doesn't sound like a deliberate attack, rather that someone did > something to whatever you're hosting to cause this to happen, which is > where the REFERER may lead you directly to the answer. > < _______________________________________________ > > > Thanks Chris... I am watching this happening still and we are still slack > jawed on a resolution... > > The referrer when we capture it from the browser user agent via webserver > log is blank... this is what we expect usually since the URL is in a print > a publication encoded in a QR Code... What happens is that someone scans > the QR Code, hits the page (updating the stats) and then is redirected to > the final content elsewhere on another website. I am unable to see any > referrer in wireshark packets on that web server, but I am by no means an > expert using wireshark, it is possible I'm missing them. If correct, this > implies that someone is either going straight to the URL manually (typing > it in) or is scanning it in. > > I agree with you that it seems like it is something that is not deliberate > because the IP's are mostly all local, the browser agent is all iPhone with > varying OS versions and Webkit versions... (HTTP_USER_AGENT:Mozilla/5.0 > (iPhone; CPU iPhone OS 6_1_2 like Mac OS X) AppleWebKit/536.26 (KHTML, like > Gecko) Mobile/10B146) (I have lots more info if needed, just can't post > public), so either it is phone specific OR the browser agents are forged... > But as you said, impossible(?) to fake the IP address, so unsure why they > would bother faking agents of the same general type (other than making it > harder to block, but that was the purpose they should have mixed it up > considerably with Android, etc...) > > An example is that a "user" scans 13 unique codes within a matter of a > couple of minutes (which is pretty aggressive... time between scans is > below 40 seconds). They seem to switch up the sessionID every ~8 attempts... > I should also point out that these are valid requests (they are not random > generated URLs or guessing)... they are valid codes. So they are either > really scanning paper OR they have a valid list of URLs they hit. > > My feeling is that it's something wrong with handling the redirects in QR > Code Scanning process which is somehow locking onto the URLs and hitting > them over and over again... specifically on iPhone... I have installed a > handful of scanners but am getting expected results... the developer > disagrees that it is not deliberate... > > He feels it is a deliberate attack since it started several hours after > the last website update (which was minor I am told), it is hitting valid > codes only (with the exception of a deleted code that was used for testing > only)... he implies that this deleted code would have NEVER been seen by > the public or appear in print. He feels that the code was likely displayed > on an administrator's page while creating the QR Codes (displaying a list > of all encoded URLs) on a compromised machine... the machine then to > captured these URLs from local cache and passed those codes to a central > server and it instructed bots to start hitting them with traffic... > > Any further ideas? I don't mind paying someone to help debug the > situation, but I think the pfSense commercial support is limited to the > firewall specifically, not the traffic that passes through it (I assume it > would be a combo of pfSense captures and IIS Log Analysis). > > Chuck > > > sounds like the scanning app or browser runs to the end of its life in background on the mobiles and the urls getting updated in a regular cycle. either triggered by accessing new QR's or by accessing other webpages.
any time scheme/pattern visible? means: only to specific times and than in a bunch? if its an automated spoofing or something else malware related ther will mostly a 24/7 pattern. if ppl. are working only daytime patterns should be visible. this can give you a hint whats going on. greetings michael -- = = = http://michael-schuh.net/ = = = Projektmanagement - IT-Consulting - Professional Services IT Michael Schuh Postfach 10 21 52 66021 Saarbrücken phone: 0681/8319664 @: m i c h a e l . s c h u h @ g m a i l . c o m = = = Ust-ID: DE251072318 = = =
_______________________________________________ List mailing list List@lists.pfsense.org http://lists.pfsense.org/mailman/listinfo/list