[Silicon Defense logo]

SnortSnarf alert page

Source: 24.198.96.120

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

16 such alerts found using input module SnortFileInput, with sources:
Earliest: 20:25:27.410826 on 05/17/2003
Latest: 20:26:04.874734 on 05/17/2003

6 different signatures are present for 24.198.96.120 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.198.96.120 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:25:27.410826 24.198.96.120:2224 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:58349 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0xABA0C04 Ack: 0xC31F8CB Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:25:27.984874 24.198.96.120:2245 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:58405 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0xACB12ED Ack: 0xCC70456 Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:25:28.281128 24.198.96.120:2255 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:58434 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xAD45EA9 Ack: 0xCAFA447 Win: 0x4470 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:25:31.531227 24.198.96.120:2381 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:58785 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xB402E91 Ack: 0xD0F750A Win: 0x4470 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:25:40.839596 24.198.96.120:2660 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:59578 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xC33D46E Ack: 0xCF5FD7F Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/17-20:25:41.120329 24.198.96.120:2667 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:59604 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xC3A1B7B Ack: 0xDB5EAA2 Win: 0x4470 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/17-20:25:41.471792 24.198.96.120:2677 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:59673 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xC437A39 Ack: 0xCF542E5 Win: 0x4470 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:25:50.772654 24.198.96.120:2954 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:60348 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0xD36C1F4 Ack: 0xDEB7B91 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:25:51.013776 24.198.96.120:2961 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:60366 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xD3BF340 Ack: 0xDB1D3ED Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:25:51.273170 24.198.96.120:2966 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:60392 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xD4029D2 Ack: 0xDC0923B Win: 0x4470 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:26:00.584307 24.198.96.120:3287 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:61284 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xE52B307 Ack: 0xEFEC8C7 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:26:03.811906 24.198.96.120:3378 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:61588 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xEA0E943 Ack: 0xE52233E Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:26:04.072959 24.198.96.120:3387 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:61605 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0xEA7C456 Ack: 0xF378695 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:26:04.337627 24.198.96.120:3392 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:61630 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xEAC6278 Ack: 0xE8A3ED9 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:26:04.592665 24.198.96.120:3402 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:61661 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0xEB4D639 Ack: 0xE9A520D Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-20:26:04.874734 24.198.96.120:3416 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:61713 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xEC0718E Ack: 0xEA045BA Win: 0x4470 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:03:53 2003