shaft client to handler?

From: Kyle R Maxwell (kylemaxwell@yahoo.com)
Date: 01/22/02


Date: Mon, 21 Jan 2002 15:15:56 -0800 (PST)
From: Kyle R Maxwell <kylemaxwell@yahoo.com>
To: incidents@securityfocus.com

I got these message from my Snort sensor earlier today. What concerns
me is that the machine in question is my firewall (runs OpenBSD 2.9),
so even though the Snort rule triggers on the port # (I think), it
shouldn't be valid traffic. Also, in the several hours previous, I've
been seeing lots of large ICMP packets and "Communication
Administratively Prohibited" traffic to various hosts on the internal
network.

Have I potentially been compromised, or is this "scatter" traffic"?

Jan 21 15:51:45 hostname snort: [1:230:1] DDOS shaft client to handler
[Classification: Attempted Denial of Service] [Priority: 2]: {TCP}
216.227.124.82:76 -> x.x.x.x:20432
Jan 21 15:51:46 hostname snort: [1:230:1] DDOS shaft client to handler
[Classification: Attempted Denial of Service] [Priority: 2]: {TCP}
216.227.124.82:20 -> x.x.x.x:20432

=====
Kyle Maxwell [kylemaxwell@yahoo.com]
"That that is is that that is not is not."

__________________________________________________
Do You Yahoo!?
Send FREE video emails in Yahoo! Mail!
http://promo.yahoo.com/videomail/

----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management
and tracking system please see: http://aris.securityfocus.com