[nsp-sec] Bracing For Impact... MS08-067

Chris Calvert Chris.Calvert at telus.com
Fri Oct 24 12:07:31 EDT 2008


Interesting, yes... In particular:

Name:    hk-in-f147.google.com
Address:  64.233.189.147

(Thanks MArc)

These IP addresses are just getting pinged with the "abcde12345fghij6789" payload, right?

212.227.93.146
64.233.189.147
202.108.22.44
66.45.237.219
59.106.116.229
69.162.76.42

Chris 

> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net 
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Tom Fischer
> Sent: Friday, October 24, 2008 9:43 AM
> To: Nicholas Ianelli
> Cc: nsp-security at puck.nether.net
> Subject: Re: [nsp-sec] Bracing For Impact... MS08-067
> 
> ----------- nsp-security Confidential --------
> 
> Hi,
> 
> On Fri, Oct 24, 2008 at 10:33:51AM -0400, Nicholas Ianelli wrote:
> > > 212.227.93.146
> > > 64.233.189.147
> > > 202.108.22.44
> > 
> > Yes, there are some interesting IPs in that list. At this 
> point all I
> > know is that the list of three IP addresses listed above get sent an
> > ICMP packet.
> 
> anyone able to provide a PCAP of such a ICMP packet - or is it just a
> normal icmp echo request? (There's a lot of icmp recho request traffic
> toward 212.227.93.146 (goole.com) - but hard to tell if it's malware
> related or just typo stuff ... 
> 
> -- 
> Tom Fischer
> BFK edv-consulting GmbH                  tel: +49 721 962 01-1
> Kriegsstr. 100, D-76133 Karlsruhe        fax: +49 721 962 01-99
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the 
> nsp-security
> community. Confidentiality is essential for effective 
> Internet security counter-measures.
> _______________________________________________
> 


More information about the nsp-security mailing list