Re: UPDATE: more SSH hacking

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2004-08-10 at 04:54, Brian Fahrlander wrote:
>     I was just noticing, while trying to reload a machine with FC1 (long
> story- don't ask) I was watching the log and noticed something I noticed
> earlier:
> 
> Aug 10 03:45:24 evv kernel: firewall: IN=eth1 OUT= MAC=00:00:c0:d9:5b:98:00:01:30:08:dc:00:08:00 SRC=221.15.178.84 DST=63.69.210.36 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=18935 DF PROTO=TCP SPT=4262 DPT=1025 WINDOW=64240 RES=0x00 SYN URGP=0
> Aug 10 03:45:30 evv kernel: firewall: IN=eth1 OUT= MAC=00:00:c0:d9:5b:98:00:01:30:08:dc:00:08:00 SRC=221.15.178.84 DST=63.69.210.36 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=20211 DF PROTO=TCP SPT=4262 DPT=1025 WINDOW=64240 RES=0x00 SYN URGP=0
> 
> <slight delay here and then:>
> Aug 10 03:45:45 evv kernel: martian destination 0.0.0.0 from 65.218.63.155, dev eth1
> 
> 
>     I'm no firewall-guru, but this having happened more than once, I get
> the feeling our new SSH-hacking friend might be trying to get around the
> firewall.
> 
>     Does anyone else concur?

Double check your system and make sure port 1025 is closed or disabled. 
That appears to be the port they are trying to hit.  What I find
interesting is the MAC address info.  It appears to be a IPV6 MAC
address not a IPV4 (to many octets).  If you don't need IPV6 you may
want to disable that as well.

A quick google on port 1025 had it listed in one place as network
blackjack.  Not sure how accurate that is.  But most likely this just
someone scanning various ports for something open or for a specific
exploit on a service that uses port 1025.

-- 
Scot L. Harris <webid@xxxxxxxxxx>



[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux