File: 1856.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (67 lines) | stat: -rw-r--r-- 1,692 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
Rule:

--
Sid:
1856

--
Summary:
This event is generated when activity indicating the presence of a
variant of the Stacheldraht DDOS tool is detected.

--
Impact:
Distributed Denial of Service (DDoS) is possible.

--
Detailed Information:
Stracheldraht is a Distributed denial of service tool normally found on
Sun Solaris machines. It is made up of a Client, handler and agent. The
clients connects to the handler. Handlers can connect with up to 1000
agents. Communication between the client and the handler is conducted
using tcp and the communication between the handler and the agent can be
either tcp or icmp_echoreply. This rule detects the message sent from
the handler to the agent. This message is used to respond to a agent
message "skillz". The handler will reply with the string "ficken". This
traffic differs from the traffic described on
http://staff.washington.edu/dittrich/misc/stacheldraht.analysis because
the packets have an icmp id of 6667 rather than 667 as noted in the analysis.

--
Affected Systems:
	Sun Solaris

--
Attack Scenarios:
The agent can be used to mount a distributed denial of service attack. It
also indicates that a machine is compromised.

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
The icmp id along with the keywords may be changed in the
source code which would then evade this rule.

--
Corrective Action:
Disconnect power from the machine and perform forensic analysis on the
hard drives.

--
Contributors:
Snort documentation contributed by Ian Macdonald
Sourcefire Vulnerability Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--