Re: Snuffing out hackers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Op woensdag 16 juli 2003 20:58, schreef Daniel Chemko:
> I am getting some disturbing packet traffic hitting my firewall. Here
> goes:
>
>
>
> IN=eth4 OUT=eth5 SRC=24.87.243.251 DST=24.57.108.11 LEN=76 TOS=0x00
> PREC=0xC0 TTL=25
>
> 4 ID=17431 PROTO=ICMP TYPE=3 CODE=3 [SRC=24.57.108.11 DST=24.87.243.251
> LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=15860 DF PROTO=TCP SPT=
>
> 3161 DPT=80 WINDOW=16384 RES=0x00 SYN URGP=0 ]
>
>
>
> None of the addresses listed in the packets are from my networks, but
> what is more disturbing is that eth4 is my internal network interface.
> Can anyone see (baring an internal intrusion has occurred) how this can
> happen?
>
>
>
> It definitely appears to be an exploit on my configuration or something.


To snif out hackers , to watch their activities, or block them ,you could put 
a bridge in front of your firewall ( OpenBSD perhaps ).
Since the bridge has no IP-address no hacker noticed that you're watching, or 
has no clue what blocks him. Even better , the bridge can not be attacked or 
hacked. ( since there is no ip-address the bridge is NOT seen as a part of 
youre network , no extra HOP is seen, makes it almost invissible  )

Some advanced method could be a honeypot.


This can give you more output about attacks or whatever an intruder wants to.  

Pascal


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux