Is your outlook server running web access? Nevermind I see that it is. It looks like 
the traffic is standard HTTP since it is coming to a dest. port of 80, I would also 
track what traffic usually comes over the src prts 1568, and 1136 off the top of my 
head I am not certain. I would if nothing else make sure that your Outlook server is 
patched, and also if not setup to do so I would strongly recommend that you setup your 
web access to use SSL instead of standard HTTP if not already done.
---
Regards,


On Tue, 15 Jan 2002 11:58:36  
 Reichert Holger wrote:
>Hello Trevor
>
>first of all as you may guess, (nobody else replied), i think that this list
>is not the right one to post such events.
>I propose to cross post it to  [EMAIL PROTECTED]
>
>There you're more likely to find the specialists in logfile reading.
>I myself am only a beginner in intrusion analysis, but what I've read by
>this time the first two Packets from Snort show the third part of the TCP
>3-way-handshake.
>So to know if there has been ever a complete TCP connection you should
>search your logfiles for SYN/ACK which your machine sent to 12.224.241.144
>and SYN which 12.224.241.144 sent to your site.
>Only if you see all these Pakets there has been an active TCP-Connection to
>your server.
>If you only see these ACK, there are two possibilities:
>1)     You've been scanned with ACK to see if your server is listening on
>Port 80
>       If you only see these ACK's to this server you should take this for
>serious, because the attacker allready knows your server
>2)     Somebody has spoofed your IP-Adress and scanned another host with
>SYN/ACK Packets.
>
>The last Packet in your mail says definitly that there has been a connect.
>But for the analysation im not yet smart enough.
>For more assistance in discovering if your server got compromised there is
>another list
>[EMAIL PROTECTED]
>For help with interpreting snort messages search in snort.org or ask
>questions in their mailing list.
>Probably you can get advise from your local CERT. Try to phone them and ask
>for routines you should go through.
>
>For future problem solving I suggest to use Tripwire which is one
>possibility to know fast if you were compromised.
>
>Best wishes
>
>Holger Reichert
>www.holysword.de
>[EMAIL PROTECTED]
>
>
>Trevor wrote:
>___________________________________________________
>Hi all,
>
> These are entries from my Snort IDS logs and my firewall logs for the IP
>address reported by Snort.  It looks like an attempt to get into our Outlook
>Web Access server. If it was a hack how could I tell if it was successful or
>not?  I did a google on it and did not come up with much
>
>[**] [1:882:1] WEB-CGI calendar access [**]
>
>[Classification: Attempted Information Leak] [Priority: 3]
>
>01/08-12:54:08.793287 12.224.241.144:1136 -> 63.xxx.xxx.xxx:80
>
>TCP TTL:51 TOS:0x0 ID:2276 IpLen:20 DgmLen:730 DF
>
>***AP*** Seq: 0xF608349  Ack: 0xFC8B5BF0  Win: 0x8ECD  TcpLen: 20
>
>
>[**] [1:882:1] WEB-CGI calendar access [**]
>
>[Classification: Attempted Information Leak] [Priority: 3]
>
>01/08-18:53:45.398355 12.224.241.144:1568 -> 63.xxx.xxx.xxx:80
>
>TCP TTL:51 TOS:0x0 ID:5645 IpLen:20 DgmLen:818 DF
>
>***AP*** Seq: 0x5C2AE779  Ack: 0x36609C29  Win: 0x8ECF  TcpLen: 20
>
> 
>Jan 09 21:53:31.093 xxxxxxxxx httpd[339]: 121 Statistics: duration=4.23
>id=51ZeM sent=544 rcvd=707 srcif=Vpn4 src=12.224.241.144/3172
>cldst=63.xxx.xxx.xxx/80 svsrc=192.xxx.xxx.xxx dstif=Vpn3
>dst=192.xxx.xxx.xxx/80 op=GET
>arg=http://www.venocoinc.com/exchange/forms/IPM/NOTE/frmRoot.asp?index=0&obj
>=000000005DDB3712FA5CD411A7EF00A0C9E0A0180700085F598189CED211A7BD00A0C9E0A01
>8000000AC4A6B00006AC011B1CB7FD411BC78001083FC58260000006245B20000&command=op
>en result="302 Object moved" proto=http rule=6 
>
>Thanks for the help
>
>Trevor Maingot 
>* 805-745-2121
>* 805-455-9660
>*   805-745-1926
>* [EMAIL PROTECTED]
>
> 
>
>


Is your boss reading your email? ....Probably
Keep your messages private by using Lycos Mail.
Sign up today at http://mail.lycos.com

Reply via email to