Honeypot or really infected

This is the place to ask for help or discuss the latest in technology

Moderator: redwarrior666

Honeypot or really infected

Postby redwarrior666 » Mon Sep 10, 2007 9:56 am

This weekend some asshole decided to scan and probe my ISA Server at home. For those of you who do not know what ISA Server is, it's Microsofts enterprise firewall. So I scanned back and got some really strang results. Sorry about the one pic being a double post I'm not awake.
You do not have the required permissions to view the files attached to this post.
----------------------------------------
"
User avatar
redwarrior666
Second Lieutenant
Second Lieutenant
 
Posts: 365
Joined: Fri Nov 19, 2004 11:26 am
Location: Fresno HELL CA

Postby Gunther » Mon Sep 10, 2007 10:22 am

:eek:
GuntertE, Lv 1, NC on Waterson
GunthertE, Lv3, TR on Mattherson
Landain, Lv3, TR on Jaeger
User avatar
Gunther
Lieutenant General
Lieutenant General
 
Posts: 4931
Joined: Thu Nov 18, 2004 10:35 pm
Location: Boston, Massachusetts

Re: Honeypot or really infected

Postby Socco » Mon Sep 10, 2007 11:24 am

redwarrior666 wrote:This weekend some asshole decided to scan and probe my ISA Server at home.


Did you file an abuse report with the ISP of that machine?

That is one SERIOUSLY infected machine, I'd guess honeypot, but it is possible that it is horrendously setup and managed.
Image
User avatar
Socco
First Lieutenant
First Lieutenant
 
Posts: 499
Joined: Sat Dec 04, 2004 4:17 pm

Postby redwarrior666 » Mon Sep 10, 2007 2:03 pm

Did you file an abuse report with the ISP of that machine?


no i didn't it usually dosen't bother me if someone scans me they aren't going to penetrate my Fort Knox setup anyhow unless they are from some unamed orginaztion (also I have nothing of value on my machine)you get the picture. I have never seen a honeypot before so it was interesting.
----------------------------------------
"
User avatar
redwarrior666
Second Lieutenant
Second Lieutenant
 
Posts: 365
Joined: Fri Nov 19, 2004 11:26 am
Location: Fresno HELL CA

Postby FloobieDoobie » Mon Sep 10, 2007 2:22 pm

Honeypots typically are set up on a per port basis, such as setting one up on http (tcp80). The pots are designed to reply back with specific strings so that you can capture the attack data as it comes in, you really don't use all those ports since that would be a huge red flag. If I was going after a machine that returned that many ports I'd back off a bit to figure out wtf is up with it.
WWFD?
User avatar
FloobieDoobie
Major
Major
 
Posts: 624
Joined: Mon Nov 22, 2004 3:23 pm


Return to Tech Corner

Who is online

Users browsing this forum: No registered users and 5 guests

cron