Announcement

Collapse
No announcement yet.

My PC got attacked.

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    My PC got attacked.

    Hi Guys,

    Whilst practicing my typing skillz, Norton kicked in and told me I?d been attacked by the ?NMap Xmas scan? from i.p address 81.210.63.226

    I found a site which told me the i.p address is in Poland. Should I be worried and are there any other preventative measures I can take to avoid this in the future?

    I?m trusting that Norton managed to prevent or contain the attack which is good. But my immediate reaction was one of revenge and I just wanted to hunt the perpetrator down!

    Any recommendations?

    Cheers

    Tommy

    #2
    You can't always be sure that the attacker is malicous as their own machine might be infected or compromised without their knowledge. At least your software identified and blocked it.

    Comment


      #3
      A lot of "attacks" are background traffic. If u get zonealarm firewall u will rack up hundreds of thousands in a weekend.

      Comment


        #4
        A personal recommendation would be a router with built it firewall.

        Comment


          #5
          Yup. Do that and run Linux or Mac OS X and chill out....

          Comment


            #6
            yeah i get loads of prompts from medium to high risk attacks

            i just close them - i dont bother checking to find out where they are, i used to but it happens so much

            Comment


              #7
              I'll post the IP on all the l33t bois sites, we'll pwn this bast back to the DOS age!

              Comment


                #8
                The poor bastard's probably got a virus, and it's port-scanning for the next victim.

                Comment


                  #9
                  C:\Program Files\nmap-3.81>nmap -v -O 81.210.63.226

                  Starting nmap 3.81 ( http://www.insecure.org/nmap ) at 2005-08-05 10:28 W. Europ
                  e Daylight Time
                  Initiating SYN Stealth Scan against ns2.citysat.com.pl (81.210.63.226) [1663 por
                  ts] at 10:28
                  Discovered open port 82/tcp on 81.210.63.226
                  Discovered open port 83/tcp on 81.210.63.226
                  SYN Stealth Scan Timing: About 14.25% done; ETC: 10:32 (0:03:01 remaining)
                  Discovered open port 81/tcp on 81.210.63.226
                  SYN Stealth Scan Timing: About 87.09% done; ETC: 10:33 (0:00:31 remaining)
                  The SYN Stealth Scan took 234.44s to scan 1663 total ports.
                  For OSScan assuming port 81 is open, 80 is closed, and neither are firewalled
                  Host ns2.citysat.com.pl (81.210.63.226) appears to be up ... good.
                  Interesting ports on ns2.citysat.com.pl (81.210.63.226):
                  (The 1657 ports scanned but not shown below are in state: filtered)
                  PORT STATE SERVICE
                  80/tcp closed http
                  81/tcp open hosts2-ns
                  82/tcp open xfer
                  83/tcp open mit-ml-dev
                  84/tcp closed ctf
                  200/tcp closed src
                  Device type: general purpose
                  Running: Linux 2.4.X|2.6.X
                  OS details: Linux 2.4.18 - 2.4.19 w/o tcp_timestamps, Linux 2.4.19 (Mandrake, X8
                  6), Linux 2.4.7 (x86), Linux 2.6.0-test5-love3 (x86)
                  TCP Sequence Prediction: Class=random positive increments
                  Difficulty=1684711 (Good luck!)
                  IPID Sequence Generation: All zeros

                  Nmap finished: 1 IP address (1 host up) scanned in 240.566 seconds
                  Raw packets sent: 6653 (266KB) | Rcvd: 68 (3278B)

                  Comment


                    #10
                    Colour me impressed sirmartyntf. But what does all that mean?

                    and lol @ nips I wish I had the skillz to do that!

                    Comment


                      #11
                      Sorry, I think this scan reveals that you're dealing with a wannabe-leet hacker.

                      I've scanned machines that were probing me before and the results look very different if it's a zombie or a malware-ridden machine: lots of open ports on those. Ports that nmap recognizes as known backdoors/ remote-control tools.

                      This one is different... Running linux, albeit a beginner's distro and almost no open ports none of those running known 'suspicious' services.

                      Edit: How appropriate, machine seems to be an xbox running linux.
                      Last edited by sirmartyntf; 05-08-2005, 09:07.

                      Comment


                        #12
                        Originally posted by sirmartyntf
                        Sorry, I think this scan reveals that you're dealing with a wannabe-leet hacker.

                        I've scanned machines that were probing me before and the results look very different if it's a zombie or a malware-ridden machine: lots of open ports on those. Ports that nmap recognizes as known backdoors/ remote-control tools.

                        This one is different... Running linux, albeit a beginner's distro and almost no open ports none of those running known 'suspicious' services.

                        Edit: How appropriate, machine seems to be an xbox running linux.
                        Report his IP address to his ISP:

                        (normally abuse@%ispname%.com )

                        /CS

                        Comment

                        Working...
                        X