[wplug] Need help...

Bill bhalpin at collaborativefusion.com
Thu Apr 3 11:49:08 EST 2003


If it is a win box, check out stuff on Foundstone's site.  They might
have something useful, they are primarily winsec geeks.

-b

On Thu, 2003-04-03 at 11:33, John Harrold wrote:
> Sometime in April Chris assaulted the keyboard and produced:
> 
> | I am at work and I think that our network has been infected by a virus or
> | some other malicious program.  I am a little unsure on where to start.  Here
> | is some background.  We have 2 W2K Servers, 2 NT, 1 RH server, and about 20
> | or so W2K desktops.  Here is the problem:  This morning and yesterday
> | morning I came in and noticed that our Net connection was down.  I checked
> | the firewall logs and had the following message: "3027 open connections, new
> | connects will be dropped".  It says that it was coming from 10.10.10.11 and
> | going to 166.x.x.x  I forget the exact IP, but it was Eastman's website.
> | (www.eastman.com <http://www.eastman.com/> ).  So I shutdown the 10.10.10.11
> | server (our webserver), and rebooted the firewall.  It came back up and we
> | had the same error.  So it has to be coming from another machine, right?  I
> | did a netstat on the servers, and didn't see anything unusual.  So we just
> | blocked the whole 166.x.x.x range.  After that there were about 3 entries in
> | the log that was blocking that port from that same 10.10.10.1 IP, and after
> | that no more.  This morning I came in and the same thing happened.  This
> | time it was going to 144.116.184.208.  So I blocked that range, and
> | everything is fine.  I ran a virus scan on all machines and nothing came up.
> | I know that the RH machine does/can have a lot of monitoring capabilities on
> | it.  How can I use that to help find what machine is causing this problem?
> | Any pointers will be greatly appreciated.
> 
> i'm not familiar with FIRE, but i've used chkroot before
> (www.chkrootkit.org). i would definitely check the linux machine first, but
> that's is because i know squat about finding this stuff in windows.
> 
> you might try tcpdump to figure out which computers are going crazy, but
> that will only work if you're not on a switched network. i think the only
> way linux can monitor the traffic on a switched network is for the traffic
> to go through the machine, in other words the linux machine would have to
> be your gateway. the only thing i think you can do is port scan the
> machines on your network:
> 
>  # nmap 10.10.10.1
> 
> i'm not sure how you fix a windows machine that's been cracked. i would
> probably reinstall, but that is due more to my own ignorance.
> 
> -- 
> ---------------------------------------------------------------
> john harrold               | "They that can give up essential  
>      jmh at member.fsf.org |  liberty to obtain a little       
> /"\                        |  temporary safety deserve neither 
> \ / ASCII ribbon campaign  |  liberty nor safety."             
>  X  against HTML mail      |                                  
> / \                        |  Benjamin Franklin
> ---------------------------------------------------------------
> gpg --keyserver keys.indymedia.org --recv-key F65A739E
> ---------------------------------------------------------------
> Jim Bakker spells his name with two k's because three 
> would be too obvious.
> --Bill Maher 





More information about the wplug mailing list