[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] unknown backdoor: 220 StnyFtpd 0wns j0
- To: full-disclosure@xxxxxxxxxxxxxxxx, rsumida@xxxxxxxxx
- Subject: Re: [Full-Disclosure] unknown backdoor: 220 StnyFtpd 0wns j0
- From: "mike king" <ngiles@xxxxxxxxxxxx>
- Date: Thu, 23 Sep 2004 11:59:46 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Couple things to look for.
1.connections to IRC
2.are the names in the IRC connection random and look generated
3.time intervals
4.does it appear that the machines on the network are getting patched
if you run a vuln scanner against them and once reported vuln?
This should point you towards if its a bot/ worm. A lot of the bots use
the lsass vuln.
best of luck. giles
On Thu, 23 Sep 2004 10:42:13 -0700 Ryan Sumida <rsumida@xxxxxxxxx> wrote:
>I've been finding a few compromised Windows systems on our campus
>that
>have a random port open with a banner of "220 StnyFtpd 0wns j0".
> All the
>systems seem to be doing SYN scans on port 445 and LSASS buffer
>overflow
>attempts. Anyone know what worm/bot is doing this? I don't have
>access
>to these machines so I can only get a network view of what the systems
>are
>doing.
>
>Thanks,
>
>Ryan
time® is a trademark of Universe©
Public use permited by fair use agreement ( copyright [NULL] )
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4
wkYEARECAAYFAkFTHWAACgkQUjm7xSZSd8G4MQCfaaDrN3OM2kYeAys2fLTMlceQJMcA
oKxgR1ANxpZK6PrxKvxyLMfFwuZe
=zS2x
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html