Avoiding and Reporting Port Attack Abuse

      What is a port attack?

      A  port  attack  is  when a 'hacker' or malicious service attempts to
      open a service port whilst you are online.  The problem is whereas PC
      users  have  Norton  Anti  Virus  to  block hackers getting in and to
      prevent  viruses,  the Amiga does not.  What's more, all the time you
      are  online  you are prone to attack.  Hackers normally use a program
      such  as  'Telnet'  to  get  access  to  your computer whilst you are
      online.  Worrying?  yes it is..  For instance a hacker can get access
      to your hard disks, steal keyfiles (that are registered to you), mess
      with  your startup-sequence, format your hard disk and upload Trojans
      to your Amiga.

      What is a Trojan?

      A  trojan  is  a  'fake'  program.   It  can be a fake version of the
      Workbench  'Mount' command, or a fake datatypes.library.  The hacking
      group  'Digital Corruption' produced a 'fake' datatypes.library which
      would  e-mail your Miami configuration straight to the hackers.  They
      could  then  steal your host IP, and password, thus, allowing them to
      even  read  your e-mail, and use your account willy-nilly !  Trojan's
      run  invisibly  in the background and will open service ports on your
      computer.   Use  a  Task snooper such as Snoopdos, or Scout to spy on
      running tasks if you are suspicious.

      If  there  is  an  executable  file  on  your  hard  drive you do not
      recognize,  run  a filezapper on it (NewZap, DPU, etc.).  Most Trojan
      viruses  writers  take  pleasure  in signing their work which you can
      then read.  If your still worried, run a good virus checker over your
      whole system partition.

      What can I do to prevent attacks from Trojan viruses?

      Download  'Safe'  from  Virus  Support Denmark.  It features a TCP/IP
      Trojan  detector:   the  moment  a  service  port  is  attacked by an
      infected  file,  'Safe',  will  warn you about it.  It is not a virus
      killer,  it  only informs you if your machine is infected by a Trojan
      virus infected file.

      What can I do to kill Trojan Viruses?

      Download  'Virus  Executor' from Virus Support Denmark along with the
      xvs.library  (freeware  library which contains the 'brains' to detect
      and   kill   them).    You  will  also  need  xad.master.library  and
      xfd.master.library  and  xpkmaster.library  and  sub library packages
      installed too).  Once again, you can obtain these from 'Virus Support
      Denmark'.

      So  far,  I have discussed what service port attacks actually are and
      Trojan  fileviruses, but the question is, how do I know if my machine
      is being attacked by hackers ?

      Logging Illegal Service Port Access:-

      As far as MiamiDx goes, it's built like a brick sh*thouse so there is
      really  need  to  deny  access to certain service port addresses.  If
      your using Miami3.2b, I strongly urge you to set the following in the
      Database --> Services section of Miami:-

      go to 'Databases' menu
      go to 'Services' sub menu
      in that section 'Add' an entry
      in this entry type the following:
      for Name put in: 'DCHack'
      for ID put in '1599'
      for protocol type: 'tcp'
      then go to the submenu called 'IP Filter'
      click on Add'
      in Protocol type '*'
      in Service type 'DCHack'
      in host type '*.*.*.*'
      leave Mask blank
      in Access type 'n'
      in Log type 'y'
      save settings

      This simple port blocker prevents Amiga hackers from issuing a DCHack
      attempt  on your computer.  These can sometimes occur on service port
      1559  and  allows  the hacker access to your hard drives.  As soon as
      the  hacker  attempts  to open service port 1559, Miami will pop up a
      shell window, displaying the time and date of the attack, the service
      port which they tried to open (in this case '1559) and the hackers IP
      address.

      Now we will add some further protection against Amiga Nukes:-

                       To stop a nuke attempt on yourself:

                       Go to the Database section of Miami
                           Select the Services section
      Double  click  on the two services with the name "Chargen" to disable
                                      them.
                              Select the IP Filter
                Enter the following lines if you do not have them

      No.    Protocol    Service       Host        Allow         Log

      1        *         DCHACK       *.*.*.*        N            Y

      2        *          19          *.*.*.*        N            Y

      3        *         137          *.*.*.*        N            Y

      4        *         138          *.*.*.*        N            Y

      5        *         139          *.*.*.*        N            Y

      6        *          *          127.0.0.1       Y            N

      7        *        12345         *.*.*.*        N            Y

      8        *        12346         *.*.*.*        N            Y

      9        *        20034         *.*.*.*        N            Y

      10       *        27374         *.*.*.*        N            Y

      11      TCP       AUTH          *.*.*.*        Y            N

      12       *         *            *.*.*.*        Y            Y

      13       *         $            *.*.*.*        Y            N

      The lines are numbered from 1-13.  Descriptions of what these entries
      do are listed below:-

      Line 1
      Prevents the DCHACK. (See beginning).

      Line 2
      Prevents an Amiga nuke working on your machine.

      Lines 3, 4 and 5

      Prevents  WinNukes  and BREAK95 attempts, although these won't affect
      your machine, it's nice to know when someone is trying it.

      Line 3 and 6
      Your  local  IP is 127.0.0.1 - this allows you to access your machine
      without logging.

      Lines 7 and 8
      Prevent and log NetBus attacks. 

      Lines 9 and 10
      Prevent attacks on service port TCP--asp--Address Search Protocol.
      I get lots of attempts on them.

      Line 11
      Allows TCP AUTH requests.

      Line 12
      Log ALL other requests.

      Line 13
      Allow all remaining ports to be accessed but not generate a log.

      Summary:
      Right,  you  should  now  have a pretty good service port blocker, to
      prevent Amiga Nukes, DCHack attempts and Break's and you are informed
      of  all  service ports which are opening whilst you are online.  Once
      you  have  set  all  this  up, all service ports (including legal and
      illegal  ones  are  logged).  Don't take all of them as attacks:  for
      instance,  if your using FTP from Dopus or are downloading files from
      Aminet  then of course, TCP/21 will open.  This is not a hack attempt
      it is you downloading/uploading a file.

      What you SHOULD be looking for are ports which SHOULD NOT BE opening.
      If  you  are  not using FTP and suddenly, TCP/21 opens up (Miami will
      inform you of this too), DISCONNECT IMMEDIATELY:  a hacker has gained
      access  to  your  hard  drives  on service port tcp/21 [File Transfer
      Protocol  Controlled  Connection].   You  can  turn  off  FTP  in the
      services  section  of Miami, but if you do, you will be unable to use
      FTP.

      Collection evidence to prosecute hackers:
      Right,  you  have  followed  my  tutorial  for Miami 3.2b to set up a
      simple  port  blocker.  All ports are logged (including legal service
      port  access) and illegal service port access.  We now need to find a
      way  of collecting evidence to prosecute any dumb ass hackers who are
      trying  to  get access to your computer.  What I am going to show you
      next is how to set this up in Miami 3.2b.

      1) Go to Aminet and download Syslog.lha (Syslog Library Distribution).

      2) Unpack the archive.

      3) Just  copy  the  file syslog.library to LIBS:  YOU DO NOT NEED TO
      INSTALL THE ENTIRE SYSLOG PACKAGE !

      4) Start Miami 3.2b (but don't go online yet).

      5)  Go  to  'Logging'  menu  in  Miami3.2b.   There  is  a box marked
      'Console'.  In the console box, enter the following:-

      CON:/0/0/640/50/Miami log/AUTO/CLOSE

      6)  In  the  box  below  there  is a box marked 'File'.  In this box,
      type:- S:MyMiami.log

      7)   Below   box   marked   'File'  the  is  a  tickbox  marked  'Use
      syslog.library' tick it.

      8) Save Miami 3.2b preferences.

      Summary:
      Now  ALL PORTS (including those which you open whilst your online are
      logged),  as  well as service port attacks and hackers may attempt to
      carry  out on your machine.  But that is not all:- they are now saved
      to a text file in your S:  directory called 'MyMiami.log'.  This file
      you  can  display  with  a text viewer.  You now have evidence if you
      wish  to prosecute hackers to their ISP.  hehe 8-) What I am going to
      show you now is how to trace hackers attempting to issue service port
      attacks  on  your  machine,  and  how  you  can  report them to their
      Internet Service Provider.


      Obtaining Evidence to prosecute hackers:-
      If  you  have  followed  the  above  section  (Collecting Evidence to
      prosecute  hackers).   The  next stage is to trace and report them to
      their internet service provider.

      All  Internet  Service  Providers  operate  an  AUP  (Acceptable  Use
      Policy).   Alternatively  to  this,  they  will  operate  a terms and
      conditions  agreement.   You  agree to this when opening your account
      with  your  internet  service  provider.   If  this is breached, most
      Internet Service providers will immediately terminate their account.

      Wait  for a service port attack, and if your have followed everything
      in  this  tutorial so far, Miami 3.2b will open a window if a service
      port  attack  occurs (listing date and time of the attack, IP of host
      who  issued  the attack and the service port they tried to open).  If
      you are 100% sure this is a service port attack by a malicious hacker
      then do the follow:-

      1) Launch NetInfo 2.

      2)  In  NetInfo's  IP box, type the hackers IP address (which logging
      from  Miami  reported),  then  click  the  'Trace'  button  opposite.
      NetInfo  will  do a trace route on the hackers IP address, as well as
      giving  you  the country they are located in (they should be the last
      listed in the list).

      3) Select them in NetInfo's Window.

      4)  Do a 'Finger This Host' Query from NetInfo's top-menu.  Providing
      they  do  not  have  service  port  79 disabled in their TCP/IP stack
      dialing  software,  you  should  see  their real name, IP address and
      login name.  Write this down.

      5) Next, do a NetWork WHOIS Query from NetInfo (Once again, make sure
      their  IP is selected in NetInfo's Window), and select 'NetWork WHOIS
      Query.   Providing  they can be traced and do not have an IP block on
      their  IP  address,  you should see the Network WHOIS information for
      their  network  (their ISP), together with an e-mail address of where
      to  report  abuse/spam  etc.  Write this e-mail address down.  If the
      e-mail address of where to report abuse is not listed, simply contact
      the networks maintainer or hostmaster instead.

      Ok, we now know:-

      - Where the hacker is from (Country)
      - Their  real  name  and  login name (If they have not denied Finger
      Query to service port 79 in their TCP/IP stack).

      - Where  to  report Spam / Abuse (Should be listed via NetWork WHOIS
      Lookup) as I described in step 5 above.

      The  next  step  is  to  report  the hack attempt they issued on your
      computer  (if  a  service port was opened illegally.  As I've already
      mentioned,  if you have followed this tutorial word-for-word, a shell
      window  will pop up, and Miami will give you the date and time of the
      attack,  IP  of the hacker, and the service port they attacked.  This
      is now saved in your S:  drawer and is called 'MyMiami.log'.

      Reporting Abuse To The Hackers IP to prosecute:-
      You  remember  the NetWork WHOIS Lookup you did in NetInfo 2 earlier.
      You  should  of  wrote  this  down.  Fire up your e-mail client YAM /
      MicroDOT  /  Thor and compose the following mail.  This is an example
      of how to issue a service port attack to the hackers ISP to prosecute
      them.   I  have  provided a template mail to show you how to do this.
      The  paragraph's  in  this example mail are numbered:  (1), (2), (3),
      etc.

      1) State the network server the attack occurred.  We know this anyway,
      since we did a NetWork WHOIS Lookup in NetInfo (paragraph 1).

      2)  State  you provide a logfile of service port attacks.  Confirming
      time  format  (24hr  clock)  and  also  include IP of hosts and ports
      illegally opened by the host (paragraph 2).

      3)  Accuracy  of  service  port  attacks that were made by the hacker
      which  are  datestamped by your computers battery backed clock.  Also
      be  sure  to  state  if your battery backed clock has been set to BST
      (Daylight  Saving  Time) or GMT (Winter time).  Confirm the date your
      clock  was  adjusted  to  either  BST  or  GMT.   State your timezone
      (paragraph 3).

      4) A brief paragraph (paragraph 4).

      5)  Paragraph  5  /  6.   I've  pasted  the  logged  attack  from  my
      MyMiami.log  (which  is  logged as a text file) into the mail, so the
      hackers  internet  service provider knows *exactly* the date and time
      of  attack  occurred,  along  with their IP address and the port they
      attempted to open.

      6)  We  know  the  hacker  attacked  service  port  27374.   This  is
      TCP--asp--Address  Search  Protocol  (service port lookup I used from
      GoPortScan!) to find out this info 8-)

      7)  Results of Finger Query I carried out on the host using NetInfo 2
      If  the  hacker  has  denied  access  to service port 79, you will be
      unable  to  perform  a finger query on their IP, in which case I have
      listed 'Connection Refused).

      8)  WHOIS  Lookup  Information.   We did a Network WHOIS query on the
      hackers  IP  using NetInfo 2 earlier, I have included it in the mail,
      proofing the hacker is located at their network.

      9)  For the last paragraph of the mail, I have specified the host has
      breach  their  internet  service  providers Acceptable Use Policy for
      opening service ports illegally to my machine.

      Their  internet  service  provider  will  now terminate their account
      since  they  are  issue  service  port  attacks / port scanning other
      members  accounts.   In  the  case  of  BT  Internet,  they  are only
      interested in hackers who are attacking other customer accounts.

      Example mail:-

      To: abuse@btinternet.com
      Subject: Port Attack Abuse From YOUR Network:-
      Message:

      Hello,

      (1) I wish to report port attack abuse located from a host located at
      your network server (BT-IMSNET) - BT Internet.

      (2) I provide a logfile of attacks (specifying date, time (in 24 hour
      format), host(s) and ports attempted to be opened by this host.

      (3)  Logfiles  of  service  port attacks are dependent on my computer
      system's  battery  backed  clock, and should be accurate within a 2-3
      minute  time  scale.   I  hereby confirm my computer system's battery
      backed  clock  was set to Daylight Saving Time (BST) as from 25 March
      2001.  My timezone is United Kingdom.

      (4)An  evidence log file of attacks made by this host located at your
      BT-IMSNET server to my computer system are as follows:-

      (5)Date:      Time:
      (6)25.07.01 00:11:50 Access from host 213.122.26.141 to port tcp/27374
      rejected.

      (7)1x  service  port  attacks  this  host  made to my computer.  Host
      attempted  to  open  service  port  27374  (TCP--asp:  Address Search
      Protocol.   Known Trojans capable of attacking this service port are:
      (SubSeven).

      (8)Results of Finger Query of this host: refused.

      WHOIS Lookup: Host is located at your BT-IMSNET server:-

      Official name: host213-122-26-141.btinternet.com

      Addresses: 213.122.26.141


      Whois for host213-122-26-141.btinternet.com

      .com is the global domain of USA & International Commercial

      (Whois queries for .com domains can be performed at
      http://rs.internic.net/cgi-bin/whois)

      whois -h whois.crsnic.net btinternet.com

      Redirecting to NETWORK SOLUTIONS, INC.


      The  Data in Network Solutions' WHOIS database is provided by Network
      Solutions   for  information  purposes,  and  to  assist  persons  in
      obtaining  information about or related to a domain name registration
      record.   Network  Solutions  does  not  guarantee  its accuracy.  By
      submitting  a WHOIS query, you agree that you will use this Data only
      for  lawful  purposes  and  that, under no circumstances will you use
      this   Data   to:   (1)  allow,  enable,  or  otherwise  support  the
      transmission   of   mass   unsolicited,   commercial  advertising  or
      solicitations  via  e-mail  (  spam  );  or  (2)  enable high volume,
      automated,  electronic processes that apply to Network Solutions ( or
      its  systems ).  Network Solutions reserves the right to modify these
      terms  at  any time.  By submitting this query, you agree to abide by
      this policy.

      Registrant:
            British Telecommunications Ltd ( BTINTERNET-DOM )
            81 Newgate Street
            London, Greater London EC1A 7AJ
            GB

      Domain Name:  BTINTERNET.COM

      Administrative Contact:
            BT WebWorld DNS  ( BS38-ORG )   dnsreg@BT.COM
            British Telecommunications plc
            PP TKS/G74/01 Trunk Exchange Nth
            109-117 Long Rd
            GB
            +44 1223 551919Fax- - +44 1223 358474
            Fax- - - +44 1223 358474
      Technical Contact:
            Artym, Rich  ( RA2240 )   rich@BT.NET
            British Telecommunications Plc
            154  St.Albans  Road
            St. Albans Hertfordshire
            AL49NH
            UK
            +44 1992-897045 ( FAX ) +44 1992-897382
      Billing Contact:
            DNS Operations Manager (DO947-ORG)  dnsbilling@BT.COM
            British Telecommunications PLC
            Post Point TKS/G74/01
            109-117 Long Road, Cambridge CB2 2HG
            GB
            +44 (0)1223 555167
            Fax- +44 (0)1223 358474

      Record last updated on 29-Sep-2000.
      Record expires on 22-Oct-2001.
      Record created on 21-Oct-1995.
      Database last updated on 24-Jul-2001 06:37:00 EDT.

      Domain servers in listed order:

      DNS2.BTINTERNET.COM            194.73.73.94
      DNS1.BTINTERNET.COM            194.73.73.95

      NOTE:
      9)Above  host  is  in  breach  of  your Acceptable Use Policy/Terms &
      Conditions  for  port scanning/attempting to open ports illegally AND
      invasion of customers privacy.

      Summary:-
      There  we  have  it then, an in depth tutorial of protecting yourself
      from  malicious  hackers  whilst  your  Amiga  is  online, as well as
      reporting abuse attacks.  Happy surfing !

By Guest Writer

Previous