What is a port attack? A port attack is when a 'hacker' or malicious service attempts to open a service port whilst you are online. The problem is whereas PC users have Norton Anti Virus to block hackers getting in and to prevent viruses, the Amiga does not. What's more, all the time you are online you are prone to attack. Hackers normally use a program such as 'Telnet' to get access to your computer whilst you are online. Worrying? yes it is.. For instance a hacker can get access to your hard disks, steal keyfiles (that are registered to you), mess with your startup-sequence, format your hard disk and upload Trojans to your Amiga. What is a Trojan? A trojan is a 'fake' program. It can be a fake version of the Workbench 'Mount' command, or a fake datatypes.library. The hacking group 'Digital Corruption' produced a 'fake' datatypes.library which would e-mail your Miami configuration straight to the hackers. They could then steal your host IP, and password, thus, allowing them to even read your e-mail, and use your account willy-nilly ! Trojan's run invisibly in the background and will open service ports on your computer. Use a Task snooper such as Snoopdos, or Scout to spy on running tasks if you are suspicious. If there is an executable file on your hard drive you do not recognize, run a filezapper on it (NewZap, DPU, etc.). Most Trojan viruses writers take pleasure in signing their work which you can then read. If your still worried, run a good virus checker over your whole system partition. What can I do to prevent attacks from Trojan viruses? Download 'Safe' from Virus Support Denmark. It features a TCP/IP Trojan detector: the moment a service port is attacked by an infected file, 'Safe', will warn you about it. It is not a virus killer, it only informs you if your machine is infected by a Trojan virus infected file. What can I do to kill Trojan Viruses? Download 'Virus Executor' from Virus Support Denmark along with the xvs.library (freeware library which contains the 'brains' to detect and kill them). You will also need xad.master.library and xfd.master.library and xpkmaster.library and sub library packages installed too). Once again, you can obtain these from 'Virus Support Denmark'. So far, I have discussed what service port attacks actually are and Trojan fileviruses, but the question is, how do I know if my machine is being attacked by hackers ? Logging Illegal Service Port Access:- As far as MiamiDx goes, it's built like a brick sh*thouse so there is really need to deny access to certain service port addresses. If your using Miami3.2b, I strongly urge you to set the following in the Database --> Services section of Miami:- go to 'Databases' menu go to 'Services' sub menu in that section 'Add' an entry in this entry type the following: for Name put in: 'DCHack' for ID put in '1599' for protocol type: 'tcp' then go to the submenu called 'IP Filter' click on Add' in Protocol type '*' in Service type 'DCHack' in host type '*.*.*.*' leave Mask blank in Access type 'n' in Log type 'y' save settings This simple port blocker prevents Amiga hackers from issuing a DCHack attempt on your computer. These can sometimes occur on service port 1559 and allows the hacker access to your hard drives. As soon as the hacker attempts to open service port 1559, Miami will pop up a shell window, displaying the time and date of the attack, the service port which they tried to open (in this case '1559) and the hackers IP address. Now we will add some further protection against Amiga Nukes:- To stop a nuke attempt on yourself: Go to the Database section of Miami Select the Services section Double click on the two services with the name "Chargen" to disable them. Select the IP Filter Enter the following lines if you do not have them No. Protocol Service Host Allow Log 1 * DCHACK *.*.*.* N Y 2 * 19 *.*.*.* N Y 3 * 137 *.*.*.* N Y 4 * 138 *.*.*.* N Y 5 * 139 *.*.*.* N Y 6 * * 127.0.0.1 Y N 7 * 12345 *.*.*.* N Y 8 * 12346 *.*.*.* N Y 9 * 20034 *.*.*.* N Y 10 * 27374 *.*.*.* N Y 11 TCP AUTH *.*.*.* Y N 12 * * *.*.*.* Y Y 13 * $ *.*.*.* Y N The lines are numbered from 1-13. Descriptions of what these entries do are listed below:- Line 1 Prevents the DCHACK. (See beginning). Line 2 Prevents an Amiga nuke working on your machine. Lines 3, 4 and 5 Prevents WinNukes and BREAK95 attempts, although these won't affect your machine, it's nice to know when someone is trying it. Line 3 and 6 Your local IP is 127.0.0.1 - this allows you to access your machine without logging. Lines 7 and 8 Prevent and log NetBus attacks. Lines 9 and 10 Prevent attacks on service port TCP--asp--Address Search Protocol. I get lots of attempts on them. Line 11 Allows TCP AUTH requests. Line 12 Log ALL other requests. Line 13 Allow all remaining ports to be accessed but not generate a log. Summary: Right, you should now have a pretty good service port blocker, to prevent Amiga Nukes, DCHack attempts and Break's and you are informed of all service ports which are opening whilst you are online. Once you have set all this up, all service ports (including legal and illegal ones are logged). Don't take all of them as attacks: for instance, if your using FTP from Dopus or are downloading files from Aminet then of course, TCP/21 will open. This is not a hack attempt it is you downloading/uploading a file. What you SHOULD be looking for are ports which SHOULD NOT BE opening. If you are not using FTP and suddenly, TCP/21 opens up (Miami will inform you of this too), DISCONNECT IMMEDIATELY: a hacker has gained access to your hard drives on service port tcp/21 [File Transfer Protocol Controlled Connection]. You can turn off FTP in the services section of Miami, but if you do, you will be unable to use FTP. Collection evidence to prosecute hackers: Right, you have followed my tutorial for Miami 3.2b to set up a simple port blocker. All ports are logged (including legal service port access) and illegal service port access. We now need to find a way of collecting evidence to prosecute any dumb ass hackers who are trying to get access to your computer. What I am going to show you next is how to set this up in Miami 3.2b. 1) Go to Aminet and download Syslog.lha (Syslog Library Distribution). 2) Unpack the archive. 3) Just copy the file syslog.library to LIBS: YOU DO NOT NEED TO INSTALL THE ENTIRE SYSLOG PACKAGE ! 4) Start Miami 3.2b (but don't go online yet). 5) Go to 'Logging' menu in Miami3.2b. There is a box marked 'Console'. In the console box, enter the following:- CON:/0/0/640/50/Miami log/AUTO/CLOSE 6) In the box below there is a box marked 'File'. In this box, type:- S:MyMiami.log 7) Below box marked 'File' the is a tickbox marked 'Use syslog.library' tick it. 8) Save Miami 3.2b preferences. Summary: Now ALL PORTS (including those which you open whilst your online are logged), as well as service port attacks and hackers may attempt to carry out on your machine. But that is not all:- they are now saved to a text file in your S: directory called 'MyMiami.log'. This file you can display with a text viewer. You now have evidence if you wish to prosecute hackers to their ISP. hehe 8-) What I am going to show you now is how to trace hackers attempting to issue service port attacks on your machine, and how you can report them to their Internet Service Provider. Obtaining Evidence to prosecute hackers:- If you have followed the above section (Collecting Evidence to prosecute hackers). The next stage is to trace and report them to their internet service provider. All Internet Service Providers operate an AUP (Acceptable Use Policy). Alternatively to this, they will operate a terms and conditions agreement. You agree to this when opening your account with your internet service provider. If this is breached, most Internet Service providers will immediately terminate their account. Wait for a service port attack, and if your have followed everything in this tutorial so far, Miami 3.2b will open a window if a service port attack occurs (listing date and time of the attack, IP of host who issued the attack and the service port they tried to open). If you are 100% sure this is a service port attack by a malicious hacker then do the follow:- 1) Launch NetInfo 2. 2) In NetInfo's IP box, type the hackers IP address (which logging from Miami reported), then click the 'Trace' button opposite. NetInfo will do a trace route on the hackers IP address, as well as giving you the country they are located in (they should be the last listed in the list). 3) Select them in NetInfo's Window. 4) Do a 'Finger This Host' Query from NetInfo's top-menu. Providing they do not have service port 79 disabled in their TCP/IP stack dialing software, you should see their real name, IP address and login name. Write this down. 5) Next, do a NetWork WHOIS Query from NetInfo (Once again, make sure their IP is selected in NetInfo's Window), and select 'NetWork WHOIS Query. Providing they can be traced and do not have an IP block on their IP address, you should see the Network WHOIS information for their network (their ISP), together with an e-mail address of where to report abuse/spam etc. Write this e-mail address down. If the e-mail address of where to report abuse is not listed, simply contact the networks maintainer or hostmaster instead. Ok, we now know:- - Where the hacker is from (Country) - Their real name and login name (If they have not denied Finger Query to service port 79 in their TCP/IP stack). - Where to report Spam / Abuse (Should be listed via NetWork WHOIS Lookup) as I described in step 5 above. The next step is to report the hack attempt they issued on your computer (if a service port was opened illegally. As I've already mentioned, if you have followed this tutorial word-for-word, a shell window will pop up, and Miami will give you the date and time of the attack, IP of the hacker, and the service port they attacked. This is now saved in your S: drawer and is called 'MyMiami.log'. Reporting Abuse To The Hackers IP to prosecute:- You remember the NetWork WHOIS Lookup you did in NetInfo 2 earlier. You should of wrote this down. Fire up your e-mail client YAM / MicroDOT / Thor and compose the following mail. This is an example of how to issue a service port attack to the hackers ISP to prosecute them. I have provided a template mail to show you how to do this. The paragraph's in this example mail are numbered: (1), (2), (3), etc. 1) State the network server the attack occurred. We know this anyway, since we did a NetWork WHOIS Lookup in NetInfo (paragraph 1). 2) State you provide a logfile of service port attacks. Confirming time format (24hr clock) and also include IP of hosts and ports illegally opened by the host (paragraph 2). 3) Accuracy of service port attacks that were made by the hacker which are datestamped by your computers battery backed clock. Also be sure to state if your battery backed clock has been set to BST (Daylight Saving Time) or GMT (Winter time). Confirm the date your clock was adjusted to either BST or GMT. State your timezone (paragraph 3). 4) A brief paragraph (paragraph 4). 5) Paragraph 5 / 6. I've pasted the logged attack from my MyMiami.log (which is logged as a text file) into the mail, so the hackers internet service provider knows *exactly* the date and time of attack occurred, along with their IP address and the port they attempted to open. 6) We know the hacker attacked service port 27374. This is TCP--asp--Address Search Protocol (service port lookup I used from GoPortScan!) to find out this info 8-) 7) Results of Finger Query I carried out on the host using NetInfo 2 If the hacker has denied access to service port 79, you will be unable to perform a finger query on their IP, in which case I have listed 'Connection Refused). 8) WHOIS Lookup Information. We did a Network WHOIS query on the hackers IP using NetInfo 2 earlier, I have included it in the mail, proofing the hacker is located at their network. 9) For the last paragraph of the mail, I have specified the host has breach their internet service providers Acceptable Use Policy for opening service ports illegally to my machine. Their internet service provider will now terminate their account since they are issue service port attacks / port scanning other members accounts. In the case of BT Internet, they are only interested in hackers who are attacking other customer accounts. Example mail:- To: abuse@btinternet.com Subject: Port Attack Abuse From YOUR Network:- Message: Hello, (1) I wish to report port attack abuse located from a host located at your network server (BT-IMSNET) - BT Internet. (2) I provide a logfile of attacks (specifying date, time (in 24 hour format), host(s) and ports attempted to be opened by this host. (3) Logfiles of service port attacks are dependent on my computer system's battery backed clock, and should be accurate within a 2-3 minute time scale. I hereby confirm my computer system's battery backed clock was set to Daylight Saving Time (BST) as from 25 March 2001. My timezone is United Kingdom. (4)An evidence log file of attacks made by this host located at your BT-IMSNET server to my computer system are as follows:- (5)Date: Time: (6)25.07.01 00:11:50 Access from host 213.122.26.141 to port tcp/27374 rejected. (7)1x service port attacks this host made to my computer. Host attempted to open service port 27374 (TCP--asp: Address Search Protocol. Known Trojans capable of attacking this service port are: (SubSeven). (8)Results of Finger Query of this host: refused. WHOIS Lookup: Host is located at your BT-IMSNET server:- Official name: host213-122-26-141.btinternet.com Addresses: 213.122.26.141 Whois for host213-122-26-141.btinternet.com .com is the global domain of USA & International Commercial (Whois queries for .com domains can be performed at http://rs.internic.net/cgi-bin/whois) whois -h whois.crsnic.net btinternet.com Redirecting to NETWORK SOLUTIONS, INC. The Data in Network Solutions' WHOIS database is provided by Network Solutions for information purposes, and to assist persons in obtaining information about or related to a domain name registration record. Network Solutions does not guarantee its accuracy. By submitting a WHOIS query, you agree that you will use this Data only for lawful purposes and that, under no circumstances will you use this Data to: (1) allow, enable, or otherwise support the transmission of mass unsolicited, commercial advertising or solicitations via e-mail ( spam ); or (2) enable high volume, automated, electronic processes that apply to Network Solutions ( or its systems ). Network Solutions reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy. Registrant: British Telecommunications Ltd ( BTINTERNET-DOM ) 81 Newgate Street London, Greater London EC1A 7AJ GB Domain Name: BTINTERNET.COM Administrative Contact: BT WebWorld DNS ( BS38-ORG ) dnsreg@BT.COM British Telecommunications plc PP TKS/G74/01 Trunk Exchange Nth 109-117 Long Rd GB +44 1223 551919Fax- - +44 1223 358474 Fax- - - +44 1223 358474 Technical Contact: Artym, Rich ( RA2240 ) rich@BT.NET British Telecommunications Plc 154 St.Albans Road St. Albans Hertfordshire AL49NH UK +44 1992-897045 ( FAX ) +44 1992-897382 Billing Contact: DNS Operations Manager (DO947-ORG) dnsbilling@BT.COM British Telecommunications PLC Post Point TKS/G74/01 109-117 Long Road, Cambridge CB2 2HG GB +44 (0)1223 555167 Fax- +44 (0)1223 358474 Record last updated on 29-Sep-2000. Record expires on 22-Oct-2001. Record created on 21-Oct-1995. Database last updated on 24-Jul-2001 06:37:00 EDT. Domain servers in listed order: DNS2.BTINTERNET.COM 194.73.73.94 DNS1.BTINTERNET.COM 194.73.73.95 NOTE: 9)Above host is in breach of your Acceptable Use Policy/Terms & Conditions for port scanning/attempting to open ports illegally AND invasion of customers privacy. Summary:- There we have it then, an in depth tutorial of protecting yourself from malicious hackers whilst your Amiga is online, as well as reporting abuse attacks. Happy surfing !