Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Network Intrusion Detection, Third Edition.pdf
Скачиваний:
220
Добавлен:
15.03.2015
Размер:
2.58 Mб
Скачать

Identify hostile individuals and groups?

Based on Whois, these source addresses came from various locales. They appear to be unrelated both in geography and time. The last address is of a little more concern, however, because it originates in Turkey. These scans appear to be hostile, but the victim seems to be rebuffing the scans.

Severity

I would assess the severity of this breach as follows:

Criticality. This is a 2, presuming this is not a critical server.

Lethality. This is a 4, because these exploits can be damaging.

Countermeasures. This is a 5, assuming that the OS is fully patched.

Net countermeasures. There doesn't seem to be a firewall, so this is a 0.

Host Scan Against FTP

Consider one more example. Eric Brock submitted Table 16.1. He used a FireWall-1 firewall to

collect the information he used for his practical.

 

 

 

 

 

Table 16.1. Example of Data Gathered on a Host Scan Against FTP

 

ID

Date

Time

SourceIP

Source Port

DestIP

DestPortProtocol Info

66153021Feb2000

9:09:24195.243.30.140

4858

10.10.1.1

FTP

TCP

len 60

66153121Feb2000

9:09:24195.243.30.140

4857

10.10.1.0

FTP

TCP

len 60

66153221Feb2000

9:09:24195.243.30.140

4860

10.10.1.3

FTP

TCP

len 60

66153321Feb2000

9:09:24195.243.30.140

4859

10.10.1.2

FTP

TCP

len 60

66163221Feb2000

9:09:25195.243.30.140

1144

10.10.1.252 FTP

TCP

len 60

66163321Feb2000

9:09:25195.243.30.140

1145

10.10.1.253 FTP

TCP

len 60

66163421Feb2000 9:09:25195.243.30.140

1146

10.10.1.254 FTP

TCP

len 60

Analysis

 

 

 

 

 

 

 

So as we analyze the attack, we want to begin with the fact the packets came to our DMZ; you could call this active targeting. It is important to determine the history. In the list below we consider it only from our DMZ's perspective, but by using Dshield (http://www.dshield.org/ipinfo.php) we can also look at the history of the source IP address at other sites. We describe the technique that was used and then make are best assessment as to the purpose of the packets, the intent, the reason we saw these packets, and begin to make our final analysis conclusions.

Existence. Someone claiming to be IP address 195.243.30.140 is visiting us.

History. There is no history of this address visiting our network.

Techniques. The visitor is sending one FTP packet to each address in our subnet. They are being sent extremely fast.

Intent. The visitor is attempting to find hosts on our network that will respond on the FTP port.

Targeting. Our entire network is being targeted, but no specific servers are being targeted.

Analysis. This visitor is performing a scan of our network, looking for ftp servers. The visitor could be planning a denial-of-service attack against an ftp server, or he could be looking for an anonymous ftp server to see what he can download from it, or to see what he can upload to it.

Severity

Severity is made up of a number of dimensions, the criticality of the target, how lethal the

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]