Handler on Duty: Didier Stevens
Threat Level: green
Loading...
|
|
Submitted By | Date |
---|---|
Comment | |
Fred de Jong | 2004-06-21 17:07:53 |
TCP port 4447 was used by "n1-rmgmt", the CyberwallPLUS firewall remote management. That Network-1 Security Solutions, Inc. (network-1.com) product appears to be dead since the end of 2002: http://biz.yahoo.com/e/040517/nssi.pk10qsb.html I saw the port (re)used in an attack that floods the Upstream of a CableTV Network link @Home.nl using (handcrafted ?) Multicast Ethernet frames. Such frames were repeatedly sent for at least 15 minutes. Intensity: ca. 18 frames/sec, ca. 12 KByte/sec ~ subscriber Upload capacity. Most header fields are constant. The only variable fields were: eth.src (all valid ManufacturerCodes MACs), ip.ttl (2...110), ip.hdrchksum. Repeating Packet: TCP [ACK] Seq=[3a 3f 07 9e] Ack=0 Win=17124 NextSeq=1460 Spoofed MAC Sources. Multicast MAC destination (01:00:5e: followed by the last 3 bytes of the default ISP gateway IP-address). Carries 1460 byte payload. I do not know which viral bot (if any) produces this. It does eat a lot of Upstream bandwidth on a public cableTV network. |
CVE # | Description |
---|