I spoke with a person that claimed to understand the attacks that are going on, while I have no proof, I offer this as an example of what to look for on your own systems. So I am presenting this only as a possible example of what has taken place, and until proven correct I concede this is only a "rumor." Basically it began by combining many scripts already in use for scanning system security holes, the script initially scans a range of IPs scanning each target system for various known exploits, once a system is compromised, the second half of the attack goes into effect. I believe it uses some form of remote execution via rcp once its been compromised to copy and execute what seems to be a specially made "DoS Daemon" to the host, once there it this daemon runs waiting to receive its orders from the people who put it there. Therefore, once enough systems were compromised in this fashion and enough systems on the net were unknowingly running this daemon, the attackers simply gave the order to hit the targets this week and their daemon's went to work. With this in mind we would need someone to find a box with this daemon on it so we can find a way to detect its existence on other systems. Logically, since the compromise of the systems was done with a script, this "DoS Daemon" would be setup the same way on every compromised system. Therefore, if someone can find it on one box, we will know exactly what to look for on other hosts. This of course will only help us if our own systems have been compromised and wouldn't be of any use at all for those boxes not within our control. One final note, a friend from Verio suggested that in the above scenario that this daemon would probaly be using TCP to be communicated with as UDP is more difficult for alot of people to code. Rodney L. Caston Southwestern Bell Internet Services
On Wed, 9 Feb 2000, Rodney Caston wrote:
I spoke with a person that claimed to understand the attacks that are going on, while I have no proof, I offer this as an example of what to look for on your own systems. So I am presenting this only as a possible example of what has taken place, and until proven correct I concede this is only a "rumor."
Do a search of the Bugtraq archives for trinoo, tribe, etc, or take at look at Dave Dittrich's page at http://www.washington.edu/People/dad/. He posted detailed breakdowns of the discovered DDoS daemons in December for the CERT workshop on DDoS's from last year. Verbose information on these attacks has been available since November/December of 1999.
Basically it began by combining many scripts already in use for scanning system security holes, the script initially scans a range of IPs scanning each target system for various known exploits, once a system is
One final note, a friend from Verio suggested that in the above scenario that this daemon would probaly be using TCP to be communicated with as UDP is more difficult for alot of people to code.
Some are using ICMP, and UDP is not that hard to code, especially if the programs are just combinations of scripts that have already been written.
Rodney L. Caston Southwestern Bell Internet Services
On a totally unrelated note, you guys really should start participating in the local peering points. Your connectivity in large metro areas like Houston, TX would greatly benefit from it. MAGIE and Compaq/Insync NAP connections would make a lot of SBC DSL users very happy, since a lot of their traffic is local content. -- Joseph W. Shaw - jshaw@insync.net Computer Security Consultant and Programmer Free UNIX advocate - "I hack, therefore I am."
participants (2)
-
Joe Shaw
-
Rodney Caston