Sophie

Sophie

distrib > Mandriva > 2006.0 > x86_64 > by-pkgid > 56c5837d9d111437878acba01e4df73e > files > 1020

snort-2.3.3-2.3.20060mdk.x86_64.rpm

Rule:

--
Sid:
1855

--
Summary:
This event is generated when activity indicating the presence of a
variant of the Stacheldraht DDOS tool is detected.

--
Impact:
Distributed Denial of Service (DDoS) is possible.

--
Detailed Information:
Stracheldraht is a Distributed denial of service tool normally found on
Sun Solaris machines. It is made up of a Client, handler and agent. The
clients connects to the handler. Handlers can connect with up to 1000
agents. Communication between the client and the handler is conducted
using tcp and the communication between the handler and the agent can be
either tcp or icmp_echoreply. This rule detects the a message sent from
the agent to the handler. This message is used to tell the handler that
the machine is still alive and able to take requests. The handler will
then reply with the string "ficken". This traffic differs from the
traffic described on
http://staff.washington.edu/dittrich/misc/stacheldraht.analysis because the
packets have an icmp id of 6666 rather than 666 as noted in the analysis.

--
Affected Systems:
	Sun Solaris
 
--
Attack Scenarios:
The agent can be used to mount a distributed denial of service attack. It
also indicates that a machine is compromised.

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
The icmp id along with the keywords may be changed in the
source code which would then evade this rule.

--
Corrective Action:
Disconnect power from the machine and perform forensic analysis on the
hard drives.

--
Contributors:
Snort documentation contributed by Ian Macdonald
Sourcefire Vulnerability Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--