[nsp-sec] ddos against 1and1
Buraglio, Nicholas D
buraglio at illinois.edu
Sun Mar 3 15:32:39 EST 2013
This looks suspiciously like the one we saw yesterday. Ill tap our guy who was decoding it and see if the window size matches.
--
nb
On Mar 3, 2013, at 1:04 PM, "Dirk Stander" <dst+nsp-sec at glaskugel.org> wrote:
> ----------- nsp-security Confidential --------
>
> 1&1 is currently suffering a ddos attack against various portal sites.
> It's a SYN flood, most probably spoofed, targeting the following IPs:
>
> www.1and1.com TCP/80 (74.208.4.60),
> admin.1and1.com TCP/443 (74.208.4.5) and
> www.1and1.fr TCP/80 (212.227.216.63)
>
> some packets:
>
> 14:49:47.291177 IP 202.102.60.209.31488 > 74.208.4.60.80: Flags [S], seq 3271755367, win 17473, options [mss 1460], length 0
> 0x0000: 4500 002c 119b 4000 6d06 a5ed ca66 3cd1 E..,.. at .m....f<.
> 0x0010: 4ad0 043c 7b00 0050 c303 0667 0000 0000 J..<{..P...g....
> 0x0020: 6002 4441 b8e6 0000 0204 05b4 0000 `.DA..........
> 14:49:47.291177 IP 210.83.251.230.7729 > 74.208.4.60.80: Flags [S], seq 4229991952, win 17473, options [mss 1460], length 0
> 0x0000: 4500 002c 2d38 4000 6e06 c24d d253 fbe6 E..,-8 at .n..M.S..
> 0x0010: 4ad0 043c 1e31 0050 fc20 8e10 0000 0000 J..<.1.P........
> 0x0020: 6002 4441 8dec 0000 0204 05b4 0000 `.DA..........
> 14:49:47.291178 IP 218.108.200.138.19477 > 74.208.4.60.80: Flags [S], seq 2466540794, win 17473, options [mss 1460], length 0
> 0x0000: 4500 002c 2d4f 4000 6e06 ed79 da6c c88a E..,-O at .n..y.l..
> 0x0010: 4ad0 043c 4c15 0050 9304 6cfa 0000 0000 J..<L..P..l.....
> 0x0020: 6002 4441 157e 0000 0204 05b4 0000 `.DA.~........
> 14:49:47.291179 IP 210.73.93.102.38701 > 74.208.4.60.80: Flags [S], seq 2035612187, win 17473, options [mss 1460], length 0
> 0x0000: 4500 002c 429a 4000 7206 4776 d249 5d66 E..,B. at .r.Gv.I]f
> 0x0010: 4ad0 043c 972d 0050 7954 fa1b 0000 0000 J..<.-.PyT......
> 0x0020: 6002 4441 ca3b 0000 0204 05b4 0000 `.DA.;........
>
> (the window size of 17473 seems to be a constant pattern)
>
> The attack started today 2013-03-03, at 4:55 UTC with about 1.0Gbit/s (1.50M P/s)
> against each target, with a peak at 8:30 UTC with 6.20Gbit/s (10.80M P/s).
> The attack is ongoing and has an aggregated bandwith of about 20Gbit/s.
>
> A good amount of the traffic enters 1&1:s backbone in Amsterdam coming from
> Level3.
>
> Does anyone recognise this attack pattern or has any intel about the botnet
> used?
>
> Thanks, Dirk Stander
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
More information about the nsp-security
mailing list