RE: Nachi

  • From: "Nabil, Ahmed" <anmahmou@xxxxxxxxxx>
  • To: "[ISAserver.org Discussion List]" <isalist@xxxxxxxxxxxxx>
  • Date: Sun, 30 Nov 2003 11:46:20 +0200

Which logs should i analuze, there are three different types of logs in the ISA 
Logs folder (Web, Firewall....etc) Is it the WEB ??
 
How Can i know the machine infecting the ISA (having the virus), What is my 
criteria ?? Is it the port number ? In most cases the Port is not enough.
 
Please advice.
 
Thanks,
 
Ahmed

-----Original Message-----
From: Thomas W Shinder [mailto:tshinder@xxxxxxxxxxxxxxxxxx]
Sent: Friday, November 21, 2003 4:12 AM
To: [ISAserver.org Discussion List]
Subject: [isalist] RE: Nachi


http://www.ISAserver.org

Hi Greg,
 
Great tool!
 
Thanks!
Tom

  _____  

From: Greg Mulholland [mailto:gmulholland@xxxxxxxxxxxxxxx] 
Sent: Friday, November 21, 2003 1:05 PM
To: [ISAserver.org Discussion List]
Subject: [isalist] RE: Nachi


http://www.ISAserver.org

Yeah, ive called on it a few times already this morning.
 
Greg Mulholland
gmulholland@xxxxxxxxxxxxxxx
http://www.isaserver.org <http://www.isaserver.org/> 
http://isatools.org <http://isatools.org/> 
http://www.google.com <http://www.google.com/>  


  _____  

From: Phill Hardstaff [mailto:phillh@xxxxxxx] 
Sent: Friday, November 21, 2003 12:19 PM
To: [ISAserver.org Discussion List]
Subject: [isalist] RE: Nachi


http://www.ISAserver.org

Thanks Greg, baretail is brilliant and free, uses virtually no CPU and very low 
memory.  Run this on your IP logs, set up some color highlights for your 
internal networks, then bingo, you vcan see a Nachi machine strat up just like 
that, low tech but it works.
 
Cheers
 
Phill

  _____  

From: Greg Mulholland [mailto:gmulholland@xxxxxxxxxxxxxxx] 
Sent: Friday, 21 November 2003 10:01 AM
To: [ISAserver.org Discussion List]
Subject: [isalist] RE: Nachi


http://www.ISAserver.org

Phil
 
try this one
 
http://www.baremetalsoft.com/baretail/index.php
 
or get cygwin. 
 

  _____  

From: Greg Mulholland [mailto:gmulholland@xxxxxxxxxxxxxxx] 
Sent: Friday, November 21, 2003 9:50 AM
To: [ISAserver.org Discussion List]
Subject: [isalist] RE: Nachi


http://www.ISAserver.org

Phil
 
There is a command. I remember using it for just this reason. I know it is a 
tail.exe because its on my system, but I cant for the life of me remember where 
it came from. I thought it may have been part of the pstools suite from 
sysinternals but its not.
 
I will try and dig it out and let you know.
 
Greg Mulholland
gmulholland@xxxxxxxxxxxxxxx
http://www.isaserver.org <http://www.isaserver.org/> 
http://isatools.org <http://isatools.org/> 
http://www.google.com <http://www.google.com/>  


  _____  

From: Phill Hardstaff [mailto:phillh@xxxxxxx] 
Sent: Thursday, November 20, 2003 3:58 PM
To: [ISAserver.org Discussion List]
Subject: [isalist] RE: Nachi


http://www.ISAserver.org


Jim, yep, I can confirm that  
http://support.microsoft.com/default.aspx?scid=283213 works great. But don't do 
the first one :) Also, once you have done this you can see in the logs very 
quickly which host the attack is coming from, just wish Windows had a tail 
command, I tried Wintail but it goes to 100% CPU, anyone know anything that 
works well, so you could watch the tail end of the packet log and see straight 
way what is happening, like 100 denies for ICMP from one internal host in under 
1 second = Nachi (most likely).

Cheers 

Phill 


 

------------------------------------------------------
List Archives: http://www.webelists.com/cgi/lyris.pl?enter=isalist
ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp
ISA Server FAQ: http://www.isaserver.org/pages/larticle.asp?type=FAQ
------------------------------------------------------
Other Internet Software Marketing Sites:
Leading Network Software Directory: http://www.serverfiles.com
No.1 Exchange Server Resource Site: http://www.msexchange.org
Windows Security Resource Site: http://www.windowsecurity.com/
Network Security Library: http://www.secinf.net/
Windows 2000/NT Fax Solutions: http://www.ntfaxfaq.com
------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as: 
gmulholland@xxxxxxxxxxxxxxx
To unsubscribe send a blank email to $subst('Email.Unsub') 


---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.542 / Virus Database: 336 - Release Date: 18/11/2003


------------------------------------------------------
List Archives: http://www.webelists.com/cgi/lyris.pl?enter=isalist
ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp
ISA Server FAQ: http://www.isaserver.org/pages/larticle.asp?type=FAQ
------------------------------------------------------
Other Internet Software Marketing Sites:
Leading Network Software Directory: http://www.serverfiles.com
No.1 Exchange Server Resource Site: http://www.msexchange.org
Windows Security Resource Site: http://www.windowsecurity.com/
Network Security Library: http://www.secinf.net/
Windows 2000/NT Fax Solutions: http://www.ntfaxfaq.com
------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as: 
tshinder@xxxxxxxxxxxxxxxxxx
To unsubscribe send a blank email to $subst('Email.Unsub') 
------------------------------------------------------
List Archives: http://www.webelists.com/cgi/lyris.pl?enter=isalist
ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp
ISA Server FAQ: http://www.isaserver.org/pages/larticle.asp?type=FAQ
------------------------------------------------------
Other Internet Software Marketing Sites:
Leading Network Software Directory: http://www.serverfiles.com
No.1 Exchange Server Resource Site: http://www.msexchange.org
Windows Security Resource Site: http://www.windowsecurity.com/
Network Security Library: http://www.secinf.net/
Windows 2000/NT Fax Solutions: http://www.ntfaxfaq.com
------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as: 
anmahmou@xxxxxxxxxx
To unsubscribe send a blank email to $subst('Email.Unsub') 

Other related posts: