To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
On Tue, 13 Jun 2006, dan wrote:
> I was curious how many people on the list are using active response
> systems for their IDS installations. If so, which ones?
since you said that you're using snort, i don't know if you have linux
firewalling enabled or not, but if so:
http://www.stearns.org/snort2iptables/
if you're using openbsd+pf, check out snort2c:
http://snort2c.sourceforge.net/
or snort2pf:
http://www.thinknerd.org/~ssc/wiki/doku.php?id=snort2pf
there are also plugins for Checkpoint SAM integration (snortsam). and also
snort-inline (in IPS mode).
in short, lots of ways to block known offending hosts with snort. just
make sure that youre ruleset is up to snuff.
you may also want to mix it with something to watch your SSH logs to track
brute forcing attempts (and insert the appropriate FW rules) and also your
apache access attempts (ie to stop those mambo attempts).
also, if you're worried about bots getting OUT of your network once
they've attacked, you can look at things like null routing if you can get
a list of known botnets and have them updated frequently enough, or you
can also firewall the destination hosts. this would block the bot from
successfully getting to the C&C server; it wont block the bot's
propagation attempts. clearly, keeping up to date on patches and auditing
for NULL or weak passwords will stop most bot propagations; it wont stop
the Trojan horse infection vector, though. keep your AV up to date and
you'll track most malware (but, i do have to admit, most of the bots i
catch and analyze are poorly detected by AV, if at all).
hope this helps,
________
jose nazario, ph.d. [EMAIL PROTECTED]
http://monkey.org/~jose/ http://monkey.org/~jose/secnews.html
http://www.wormblog.com/
_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets