Netbios is evil...

It's the #1 most hacked port.
It does smb filesharing and stuff like that.  However, #137 is the
nameservice, so most likely these boxes are just trying to figure out your
"windows name".  If it's followed up immediately by a hit on port 139 or
139, then you've got a problem.  I just block out #137-9 at the firewall
and on the box itself.

Rob Hudson wrote:

> Hi EUGLUGers,
>
> I recently turned on login logging on the EUGLUG server (FreeBSD).
> It's a kernel switch called 'log_in_vain'.  I'm seeing a lot of the
> following:
>
> > Connection attempt to UDP 207.189.137.44:137 from 208.50.149.200:137
> > Connection attempt to UDP 207.189.137.44:137 from 208.50.149.200:137
> > Connection attempt to UDP 207.189.137.44:137 from 208.50.149.200:137
> > Connection attempt to TCP 207.189.137.44:113 from 216.116.33.121:3818
> > Connection attempt to UDP 207.189.137.44:137 from 207.137.197.33:137
> > Connection attempt to UDP 207.189.137.44:137 from 207.137.197.33:137
>
> Here is what is in the /etc/services file for these two ports on that
> box:
>
> auth            113/tcp    ident tap    #Authentication Service
> auth            113/udp    ident tap    #Authentication Service
> netbios-ns      137/tcp    #NETBIOS Name Service
> netbios-ns      137/udp    #NETBIOS Name Service
>
> Authentication kind-of speaks for itself, but what is NetBIOS?
>
> Thanks,
> Rob

--
Organizing Linux users is like herding cats,
only harder.


Reply via email to