Chapter 6: psad Operations: Detecting Suspicious Traffic
There are many features offered by psad, and these features are designed to maximize your use of iptables log messages. From port scans to probes for backdoors, psad detects and reports suspicious activity with verbose email and syslog alerts.Here is an example psad alert:
=-=-=-=-=-=-=-=-=-=-=-= Sat Sep 22 01:10:13 2007 =-=-=-=-=-=-=-=-=-=-=-=
Danger level: [4] (out of 5)
Scanned TCP ports: [10-65301: 1522 packets]
TCP flags: [SYN: 1522 packets, Nmap: -sT or -sS]
iptables chain: INPUT (prefix "DROP"), 499 packets
Source: 192.168.10.200
DNS: int_scanner
OS guess: Linux:2.5::Linux 2.5 (sometimes 2.4)
Destination: 192.168.10.1
DNS: iptablefw
Overall scan start: Thu Sep 13 21:22:26 2007
Total email alerts: 7
Complete TCP range: [1-65301]
Syslog hostname: iptablesfw
Global stats: chain: interface: TCP: UDP: ICMP:
INPUT eth1 3229 0 2
[+] TCP scan signatures:
"BACKDOOR SatansBackdoor.2.0.Beta, or BackConstruction 2.1 Connection Attempt"
dst port: 666 (no server bound to local port)
flags: SYN
psad_id: 100041 (derived from: 118 157 158)
chain: INPUT
packets: 2
classtype: misc-activity
reference: (arachnids) http://www.whitehats.com/info/IDS316
"POLICY vncviewer Java applet communication attempt"
dst port: 5801 (no server bound to local port)
flags: SYN
sid: 1846
chain: INPUT
packets: 1
classtype: misc-activity
reference: (nessus) http://cgi.nessus.org/plugins/dump.php3?id=10758
"P2P Napster Client Data communication attempt"
dst port: 6699 (no server bound to local port)
flags: SYN
sid: 561
chain: INPUT
packets: 2
classtype: policy-violation
"SNMP AgentX/tcp request"
dst port: 705 (no server bound to local port)
flags: SYN
sid: 1421
chain: INPUT
packets: 2
classtype: attempted-recon
reference: (bugtraq) http://www.securityfocus.com/bid/4088
reference: (bugtraq) http://www.securityfocus.com/bid/4089
reference: (bugtraq) http://www.securityfocus.com/bid/4132
reference: (cve) http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0012
reference: (cve) http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0013
[+] Whois Information:
OrgName: Internet Assigned Numbers Authority
OrgID: IANA
Address: 4676 Admiralty Way, Suite 330
City: Marina del Rey
StateProv: CA
PostalCode: 90292-6695
Country: US
NetRange: 192.168.0.0 - 192.168.255.255
CIDR: 192.168.0.0/16
NetName: IANA-CBLK1
NetHandle: NET-192-168-0-0-1
Parent: NET-192-0-0-0-0
NetType: IANA Special Use
NameServer: BLACKHOLE-1.IANA.ORG
NameServer: BLACKHOLE-2.IANA.ORG
Comment: This block is reserved for special purposes.
Comment: Please see RFC 1918 for additional information.
Comment:
RegDate: 1994-03-15
Updated: 2002-09-16
OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName: Internet Corporation for Assigned Names and Number
OrgAbusePhone: +1-310-301-5820
OrgAbuseEmail: abuse@iana.org
OrgTechHandle: IANA-IP-ARIN
OrgTechName: Internet Corporation for Assigned Names and Number
OrgTechPhone: +1-310-301-5820
OrgTechEmail: abuse@iana.org
# ARIN WHOIS database, last updated 2007-09-15 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.
=-=-=-=-=-=-=-=-=-=-=-= Sat Sep 22 01:10:13 2007 =-=-=-=-=-=-=-=-=-=-=-=




