[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Toad Hop
On Sun, 7 Jan 1996, John Young wrote:
> Quoting some body:
> On Christmas Day 1994 the attack begins.
>
> First, the intruder breaks into a California Internet site
> that bears the cryptic name toad.com. Working from this
> machine, the intruder issues seven commands to see who's
> logged on to Shimomura's workstation, and if he's sharing
> files with other machines.
From Shimomura's mail last January:
: The IP spoofing attack started at about 14:09:32 PST on 12/25/94. The first
: probes were from toad.com (this info derived from packet logs):
:
: 14:09:32 toad.com# finger -l @target
: 14:10:21 toad.com# finger -l @server
: 14:10:50 toad.com# finger -l root@server
: 14:11:07 toad.com# finger -l @x-terminal
: 14:11:38 toad.com# showmount -e x-terminal
: 14:11:49 toad.com# rpcinfo -p x-terminal
: 14:12:05 toad.com# finger -l root@x-terminal
> Then the automatic spoofing attack begins. It will all be
> over in sixteen seconds. The prediction packet attack
> program fires off a flurry of packets to busy out the
> trusted Internet server so it can't respond. Next, the
> program sends twenty more packets to Shimomura's UNIX
> workstation.
Again, quoting Shimomura's mail:
: About six minutes later, we see a flurry of TCP SYNs (initial connection
: requests) from 130.92.6.97 to port 513 (login) on server...
: 130.92.6.97 appears to be a random (forged) unused address (one that will
: not generate any response to packets sent to it)...
Given that this was a _spoofing_ attack, mayhaps the packets from toad.com
were also forgeries. Anyone in the know?
- PS
--
Ng Pheng Siong <[email protected]>
NetCentre Pte Ltd * Singapore
Finger for PGP key.