Well, shit, even if no one else is doing it yet, it sounds like a pretty
good idea to me!  I say we do it.

E

On Thu, 31 May 2001, Daniel Trudell wrote:

> ok, so maybe this could be called "entry n in the diary of a
> /var/log/messages junkie"
>
> Gnutella's port is 6346.  As a brief refresher....gnutella is like napster
> with no central server.  every peer is also a search server.
>
> So anyway....it's fairly disributed, and you can make your own client,
> seeing as how the protocol is open source.  Well, a common way to beat
> intrusion detection is to do each probe from a seperate IP.  I've started
> to see denied packets (oh miraculous tcpwrappers, I worship thee) in my
> logs with a source port of 6346 (gnutty) and high level dest ports
> corresponding to various proxy servers.
>
> So with enough paranoia, tequila and inference it becomes possible that
> people are using gnutella to distribute the sources of sweeps and scans,
> thereby beating IDS's.  It is also possible that a gnutty client out there
> has a very agressive discovery phase implementation.
>
> Anybody noticed anything similar?  It seems much more efficiant than
> cracking boxen to launder identity...dupe people into running your scanner
> in the background by giving them trojaned gnutella clients...or at least
> superimposing your probe on top of a gnutella request.
>
> tack
>
> -------------------------------------------------------
> "My Penguin style Kung-Fu will beat your Redmond style"
>
>

Reply via email to