I will say right away: the word "incident" is in quotes, because in fact, there was no incident. It was the “stable” operation of the vents ...I sit at work, I don’t touch anyone, I read the book "
Linux Advanced Routing & Traffic Control HOWTO " ...
Colleagues yelled, they say there is no Internet. I connect to the gateway, I have it on
pfSense 1.2.3 , I go to Status -> Traffic graph: the channel is blocked by outgoing traffic. I climb into Services -> BandwidthD, find a suspicious computer (192.168.0.197), whose UDP traffic is several tens of meters, pull its cable out of the switch, look at the gateway charts, the Internet has come to life. I stick a cable, again outgoing traffic clogs the channel. Blocked it on the fire and went to this computer.
Closed all the programs. I started netstat, nothing suspicious, the task manager is also clean. T.zh. checked the trail. utilities:
TCPView ,
Autoruns and
Process Explorer . Purely! I downloaded and checked through
AVZ . Purely! Started scanning antivirals. Purely! Scanned two more. Purely! Booted from LiveCD, scanned again. Purely! Hair is on end, the brain is in shock.
I returned to myself, went to the Diagnostics -> State Summary, did a search on the page at “192.168.0.197” and in the “By IP Pair” section I find the following:
IP # States Proto # States Src Ports Dst Ports
192.168.0.197 -> 207.46.232.182 2
udp 2 1 1
There were others, but I was interested in the UDP protocol. Watch what this IP is:
$ host 207.46.232.182
In the answer I see a lot of DNS names, which annoys me, but the next one was completely surprised:
182.232.46.207.in-addr.arpa domain name pointer <b> agent.microsoft.com </ b>.
182.232.46.207.in-addr.arpa domain name pointer <b> channels.microsoft.com </ b>.
Already almost furious, I go to Diagnostics -> Packet Capture and start capturing all the packets that go from / to 207.46.232.182. In response, I see the following:
15: 37: 25.117132 IP 192.168.0.197.123> 207.46.232.182.123: UDP, length 48
15: 37: 25.123705 IP 207.46.232.182.123> 192.168.0.197.123: UDP, length 48
Port 123 is the same
NTP , make sure:
$ grep 123 / etc / services
ntp 123 / tcp
ntp 123 / udp # Network Time Protocol
Yes that's right.
I’m going back to that car, poking twice by the hour, on the last tab I’ll remove a single checkbox, OK ... Vaul, the traffic stopped going (i.e. the monitor at the bottom right went out). For loyalty t.zh. I cut down the vortex time service.
Returning to myself, I enter in the terminal:
$ host time.windows.com
In response, I get:
time.windows.com is an alias for time.microsoft.akadns.net.
time.microsoft.akadns.net has address 207.46.232.182
')
And then think about it (without analyzing the traffic, of course) that this is a popular and “reliable” OS, I just wanted the brain to tell me, and not some regular, fresh troj covered with a rootkit.Once again, I made sure that the Windows Time Service should be cut down.
PS: The purpose of the post: to show the example of novice admins, how to determine and expose the "anomalies" in the network.
PPS: For those who do not know pfSense ... By default, the “BandwidthD” and “States Summary” packages are not installed. They should be set independently in System -> Packages.