[nsp-sec] ACK 26496 - Re: 30K (Openish) Resolvers
Greg Schwimer
gschwimer at godaddy.com
Tue Apr 9 22:50:35 EDT 2013
----- Original Message -----
From: "Krista Hickey" <Krista.Hickey at cogeco.com>
To: nsp-security at puck.nether.net
Sent: Tuesday, April 9, 2013 7:20:33 PM
Subject: [nsp-sec] 30K (Openish) Resolvers
----------- nsp-security Confidential --------
[Apologies if this is duplicate for you, just trying to get the word out]
Hi All
Attached is just shy of 30k resolvers used to attack a customer playing XBOX. Attack was earlier today,
Start 2013-04-09 17:24 (-0400)
End 2013-04-09 19:54 (-0400)
Typical DNS amplification attack with lots of requests including a newish one for me, deniedstresser.com if that rings any bells. A fatfinger had me doing some searches for deniedstressor.com at first which returns some results too (ie: pastebin.com/BpQ9u32e).
I will hold the full data for a couple of days if anyone absolutely needs exact timestamps but ask sooner rather than later and only if you really need it. This really wasn't that big of an attack so not a call to arms to help us but if anyone wants to backtrack a bit...that'd be cool. Might also be neat for someone to cross reference with Jared's resolver work, maybe an extra flag to indicate it actually has been used in an attack for added effect.
Also of note is that, as discussed previously, the fact that recursion is turned off but you still answer doesn't really mean much to attacker or victim as response is response, ie: the attack participant below.
Thanks for help in securing things, share as necessary without attribution.
Krista
; (1 server found)
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46809
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 13, ADDITIONAL: 4
;; WARNING: recursion requested but not available
;; QUESTION SECTION:
;example.com. IN A
;; AUTHORITY SECTION:
. 3600 IN NS j.root-servers.net.
. 3600 IN NS l.root-servers.net.
. 3600 IN NS b.root-servers.net.
. 3600 IN NS h.root-servers.net.
. 3600 IN NS e.root-servers.net.
. 3600 IN NS d.root-servers.net.
. 3600 IN NS c.root-servers.net.
. 3600 IN NS a.root-servers.net.
. 3600 IN NS i.root-servers.net.
. 3600 IN NS f.root-servers.net.
. 3600 IN NS g.root-servers.net.
. 3600 IN NS m.root-servers.net.
. 3600 IN NS k.root-servers.net.
;; ADDITIONAL SECTION:
j.root-servers.net. 3600 IN A 192.58.128.30
l.root-servers.net. 3600 IN A 199.7.83.42
b.root-servers.net. 3600 IN A 192.228.79.201
h.root-servers.net. 3600 IN A 128.63.2.53
;; Query time: 32 msec
;; SERVER: 173.193.248.101#53(173.193.248.101)
;; WHEN: Tue Apr 9 23:06:30 2013
;; MSG SIZE rcvd: 508
_______________________________________________
nsp-security mailing list
nsp-security at puck.nether.net
https://puck.nether.net/mailman/listinfo/nsp-security
Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
community. Confidentiality is essential for effective Internet security counter-measures.
_______________________________________________
More information about the nsp-security
mailing list