Looking for examples of network attacks, counterattacks, and protections.
James R. Van Zandt
jrvz at comcast.net
Sat Sep 9 22:14:17 EDT 2006
David -
I have a boatload of auth.log entries like this:
Sep 9 06:41:19 vanzandt CRON[27524]: (pam_unix) session closed for user root
Sep 9 06:42:20 vanzandt sshd[28685]: Did not receive identification string from ::ffff:61.95.172.140
Sep 9 06:43:01 vanzandt CRON[28686]: (pam_unix) session opened for user jrv by (uid=0)
Sep 9 06:43:03 vanzandt CRON[28686]: (pam_unix) session closed for user jrv
Sep 9 06:45:39 vanzandt sshd[28723]: Illegal user test from ::ffff:61.95.172.140
Sep 9 06:45:39 vanzandt sshd[28723]: error: Could not get shadow information for NOUSER
Sep 9 06:45:39 vanzandt sshd[28723]: Failed password for illegal user test from ::ffff:61.95.172.140 port 4212 ssh2
Sep 9 06:45:42 vanzandt sshd[28725]: Illegal user test from ::ffff:61.95.172.140
Sep 9 06:45:42 vanzandt sshd[28725]: error: Could not get shadow information for NOUSER
Sep 9 06:45:42 vanzandt sshd[28725]: Failed password for illegal user test from ::ffff:61.95.172.140 port 4340 ssh2
Sep 9 06:45:45 vanzandt sshd[28727]: Illegal user test from ::ffff:61.95.172.140
Sep 9 06:45:45 vanzandt sshd[28727]: error: Could not get shadow information for NOUSER
Sep 9 06:45:45 vanzandt sshd[28727]: Failed password for illegal user test from ::ffff:61.95.172.140 port 4477 ssh2
Sep 9 06:45:48 vanzandt sshd[28729]: Illegal user test from ::ffff:61.95.172.140
Sep 9 06:45:48 vanzandt sshd[28729]: error: Could not get shadow information for NOUSER
Sep 9 06:45:48 vanzandt sshd[28729]: Failed password for illegal user test from ::ffff:61.95.172.140 port 4583 ssh2
Sep 9 06:45:52 vanzandt sshd[28731]: Illegal user test from ::ffff:61.95.172.140
Sep 9 06:45:52 vanzandt sshd[28731]: error: Could not get shadow information for NOUSER
Sep 9 06:45:52 vanzandt sshd[28731]: Failed password for illegal user test from ::ffff:61.95.172.140 port 4792 ssh2
Your coworker is welcome to a copy of the logs if they would do any
good.
(BTW I have "PermitRootLogin no" in /etc/sshd.conf.)
- Jim Van Zandt
Date: Fri, 8 Sep 2006 15:49:48 -0400 (EDT)
From: "David Kramer" <david at thekramers.net>
X-Priority: 3 (Normal)
Importance: Normal
X-BLU-MailScanner: Found to be clean, Found to be clean
Sender: discuss-bounces at blu.org
X-BLU-MailScanner-Information: Please contact the ISP for more information
X-BLU-MailScanner-From: discuss-bounces at blu.org
A coworker of mine is looing for some real-world or synthetic data of previous network
attacks, attack patterns/types, defense strategies that nets used against
attacks, etc. for model training/testing. He's also interested in talking to SysAdmins
who would be willing to talk about network security and network attacks. This is for a
research project.
Anyone interested? I'll forward your info on to him if you send it to me.
Thanks.
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
More information about the Discuss
mailing list