[ale] Frequency of high port scans

Charles Marcus CharlesM at Media-Brokers.com
Sat Apr 13 10:35:39 EDT 2002


Actually, I would argue that it can *help* - and even more importantly, what
can it *hurt*?

So, you lock down the server as much as possible, then, on *top* of that, you
use a very non-standard port - just one more little thing to frustrate the
port scans.

Of *course* anyone who relied solely on this would be a fool - but I see no
good reson *not* to use non-standard ports (for private/corporate DB access,
etc), and *very* good reasons *to* do so.

Charles


> -----Original Message-----
> From: Michael H. Warfield [mailto:mhw at wittsend.com]
> Sent: Friday, April 12, 2002 10:04 PM
> To: Dow Hurst
> Cc: ale at ale.org
> Subject: Re: [ale] Frequency of high port scans
>
>
> On Fri, Apr 12, 2002 at 07:22:26PM -0400, Dow Hurst wrote:
> > When crackers are scanning for open ports, what is the
> frequency of high
> > port scans of normally unused ports?  Most crackers would
> not scan every
> > port on every machine, correct?  So would having a
> webserver available
> > on port 61235, for example, keep a webserver from being
> attacked based
> > on current attack profiles?  Many webservers are for limited use by
> > small workgroups and aren't really meant to be truly
> public.  I am just
> > interested in current hard data on how port scans are usually
> > conducted.  I would imagine this might be how security by obscurity
> > could actually succeed.  I can use the kind of data the Michael H.
> > Warfield posted to warn people to stay on top of patches for all
> > webservers.
>
> 	Security through obscurity can never succeed.  NEVER.  For many
> and varied reasons.  For the most part, security through obscurity
> insures that you will remain vulnerable (through a false
> sense of security)
> until they come and take your carcass away...  Security
> through obscurity
> is insecurity.
>
> 	Scanning...
>
> 	Over the years, there have been a number of notable trends.
> Nobody has ever focused on scanning every possible port on a
> particular
> IP address.  Simple fact.  Not done.  Not in all my years on
> the internet
> have I even seen someone try other than misguided security people who
> thought they had to scan everything on everybox they had.  There has
> simply never been anything productive the effort.
>
> 	In the past, it was productive to scan for "well known
> services" on
> a particular IP and this was common for a very long time.
> This is what I
> call a "deep scan".  Scan a single point (IP address) and scan it deep
> for everything it's got.  It can be useful, particularly if
> you (as liveware
> at a keyboard) know what's sitting in the middle of that bullseye you
> just drew around that IP address.  That's just not the rule anymore...
>
> 	In the last few years it has become much more popular, orders of
> magnitude more popular, to scan across as many IP addresses
> as possible
> (and there is a black art to studying the scanning patterns
> in those addresses)
> for only one or a few services.  This is what I personally
> refer to as a "wide
> scan".  This actually yields a much higher "bang for the
> buck" especially if
> you already know of some exploitable services.  Almost all
> autonomous worm
> operate this way.  Some, such as l1on, Ramen, CodeRed, Nimda,
> and the sadmind
> cross-platform worm, actually scan for multiple services and
> will exploit
> what they find.  Invariably, it's a limited number of services.  But
> scanning isn't the only way they propagate (and isn't even the most
> productive way they propagate).  Hybrid threats (autonomous
> threats which
> use multimodal propagation techniques) are the big problem
> right now and
> getting bigger...
>
> 	That being said...  Hiding by using a non standard port
> is doomed
> to failure.  Why?  Because someone has to know about it somewhere.  So
> you have a web server on port 12345 (I've chosen that number
> for a special
> reason).  Do you publish it somewhere?  Will it get sniffed from the
> wire somewhere?  Will you send it to a friend in an E-Mail?  If you
> don't ever use it and don't ever tell anyone about it, you MIGHT have
> a half chance of hiding it, but what good is it?  But scanning is NOT
> the only way these things find you.  They do glom web page
> requests, they
> do sniff the wire, they do grouse E-Mail (and, by extension,
> mailing list
> archives).  Sooner or later, your "hidden" port number will
> be known to
> those you are hiding it from.  And you won't know when it
> happens or how
> it happens or who gets it or who they give it to.  But it
> will happen...
> What if some just HAPPENS to come out with a backdoor on that
> port (12345
> has a well known backdoor - did you know that)?  Did you know about it
> when you set it up?  Do you know that they are scanning for
> it CONSTANTLY?
> Another one is 31337 (Hacker code for Elite - ELEET).  Do you have a
> current and up to date list of what the commonly abused high
> order ports
> are?  Once you start using it and you get slammed by some lamer that
> finds you, then what'cha'gonna'do?
>
> 	On top of all of that...  The number one way that systems get
> broken into, to this day, remains social engineering.  What a
> friend of
> mine, Rob Thomas, refers to as the "come and get me"
> approach.  You make
> something attractive and just let people screw themselves.  That's how
> all those worms got behind all those NAT devices.  Once
> there, they can
> use other tricks to find web pages and web servers and
> proxies (yes, they
> will even find your proxies) and continue their activities.  Once they
> have glommed it (aquired it through sniffing or trickery) or
> groused it
> (aquired it by pawing through your files) it's going to
> spread.  Secret
> go bye-bye...  Now what?  Change the port?  That'll be real
> damn useful...
>
> 	Worrying about hidding a web server from scanning is worrying
> about a needle in a haystack with a tornado bearing down on
> your butt...
> You got bigger problems and bigger things to worry about.
>
> > Dow
>
> > --
> > __________________________________________________________
> > Dow Hurst                   Office: 770-499-3428
> > Systems Support Specialist  Fax:    770-423-6744
> > 1000 Chastain Rd.
> > Chemistry Department SC428  Email:dhurst at kennesaw.edu
> > Kennesaw State University         Dow.Hurst at mindspring.com
> > Kennesaw, GA 30144
> > *********************************
> > *Computational Chemistry is fun!*
> > *********************************
>
> 	Mike
> --
>  Michael H. Warfield    |  (770) 985-6132   |  mhw at WittsEnd.com
>   /\/\|=mhw=|\/\/       |  (678) 463-0932   |
http://www.wittsend.com/mhw/
  NIC whois:  MHW9      |  An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!

---
This message has been sent through the ALE general discussion list.
See http://www.ale.org/mailing-lists.shtml for more info. Problems should be
sent to listmaster at ale dot org.


---
This message has been sent through the ALE general discussion list.
See http://www.ale.org/mailing-lists.shtml for more info. Problems should be 
sent to listmaster at ale dot org.






More information about the Ale mailing list