New SubSeven outbreak?

2002-05-12 Thread Jeff Workman


All,

I have seen 6 portscans looking for SubSeven on a /24 in the past 24 hours. 
It'd been a while since I had seen *any*, now I'm seeing all these.  Is 
this a new outbreak/vulnerability, or have I just been lucky?  Has anybody 
else seen an increase in scans on tcp port 27374?

I scanned through BugTraq and didn't see any mention of anything there.

-J

--
Jeff Workman | [EMAIL PROTECTED] | http://www.pimpworks.org



Re: New SubSeven outbreak?

2002-05-12 Thread Johannes B. Ullrich



 I have seen 6 portscans looking for SubSeven on a /24 in the past 24 hours. 
 It'd been a while since I had seen *any*, now I'm seeing all these.  Is 
 this a new outbreak/vulnerability, or have I just been lucky?  Has anybody 
 else seen an increase in scans on tcp port 27374?

There are a number of IRC controlled bots that will allow 
scanning of subnets for Sub7. So you will see occasional
flameups of Sub7 scans as they happen to focus on your
network. Try to connect to some of the cable modem in 24/8
and you will see more of that.

I should still have a little perl honeypot around that you can use
to find out what they try to install on sub7 infected machines.

-- 
---
[EMAIL PROTECTED]Join http://www.DShield.org
  Distributed Intrusion Detection System





Re: New SubSeven outbreak?

2002-05-12 Thread Jeff Workman




Stoned koala bears drooled eucalyptus spit in awe as Johannes B. Ullrich 
exclaimed:



 I have seen 6 portscans looking for SubSeven on a /24 in the past 24
 hours.  It'd been a while since I had seen *any*, now I'm seeing all
 these.  Is  this a new outbreak/vulnerability, or have I just been
 lucky?  Has anybody  else seen an increase in scans on tcp port 27374?

 There are a number of IRC controlled bots that will allow
 scanning of subnets for Sub7. So you will see occasional
 flameups of Sub7 scans as they happen to focus on your
 network. Try to connect to some of the cable modem in 24/8
 and you will see more of that.

 I should still have a little perl honeypot around that you can use
 to find out what they try to install on sub7 infected machines.

Thanks for the pointer.  I looked on www.sans.org for it, but couldn't find 
it, but I found one on another site called leaves that seems to do what I 
need.  It's going to be amusing to see IRC bots try to upload windows EXE 
files to a NetBSD machine and try to run them.

-J

--
Jeff Workman | [EMAIL PROTECTED] | http://www.pimpworks.org