[nsp-sec] Strong Increase in port 1433/tcp

Smith, Donald Donald.Smith at qwest.com
Mon Mar 2 16:31:23 EST 2009


That should be sql not swl:)
And I think dasher is the constant since that has been around a LONG time.
Can someone that saw this in their darknet validate that the increase is caused by the non-6000-1433 traffic?


(coffee != sleep) & (!coffee == sleep)
Donald.Smith at qwest.com gcia   

> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net 
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of 
> Smith, Donald
> Sent: Monday, March 02, 2009 1:18 PM
> To: 'Klaus Moeller'; 'nsp-security at puck.nether.net'
> Subject: Re: [nsp-sec] Strong Increase in port 1433/tcp
> 
> ----------- nsp-security Confidential --------
> 
> Is ~1/2 of it all coming from or going to tcp port 6000?
> 
> 
> more /tmp/1433.03-02.ips | awk '{ if(($5==6000) || ($8==6000) 
> )print $8}' |wc -l                                            
>                          458159
> wc -l /tmp/1433.03-02.ips 
> 845859 
> 
> Count source port:
> Sourced from 6000
> 442043 6000
> 19026 80
> 1784 443
> 
> Destined to 6000
> 16116 6000
> 12539 80
> 1874 443
>  624 3759
> 
> Mostly syn scanning.
> 
> This shows 324 non syn packets sourced from 6000 destined to 1433.
> 
> /tmp/1433.03-02.ips | awk '{ if(($5==6000) && ($10!=2) )print 
> $8}' | wc -l  
> 324
> 
> So what are those? They are all resets.
> w32.dasher used 6000 as a source port and attempted to 
> exploit an microsoft swl server vulnerability.
> 
> http://vil.mcafeesecurity.com/vil/content/v_137567.htm
> 
> Note that your two pictures show a huge increase in source 
> ips not destination ips.
> The sans shows targets stayed about the same.
> 
> So is this an outbreak of dasher or is dasher the old noise 
> and this is something new?
> 
> 
> (coffee != sleep) & (!coffee == sleep)
> Donald.Smith at qwest.com gcia   
> 
> > -----Original Message-----
> > From: nsp-security-bounces at puck.nether.net 
> > [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of 
> > Klaus Moeller
> > Sent: Monday, March 02, 2009 9:42 AM
> > To: nsp-security at puck.nether.net
> > Subject: [nsp-sec] Strong Increase in port 1433/tcp
> > 
> > ----------- nsp-security Confidential --------
> > 
> > 
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the 
> nsp-security
> community. Confidentiality is essential for effective 
> Internet security counter-measures.
> _______________________________________________
> 


More information about the nsp-security mailing list