Posted on 10/18/2002 8:38:06 PM PDT by vannrox
I have been monitoring my PC system, and I have noted a pattern that might be of interest to Freepers. When ever I visit FR I generally get hit with an unauthorized Internet attack. These attacks are low-level, and it appears that someone or something is attempting to probe my PC when ever I log into FR.
I strongly urge other Freepers to make sure that they have somekind of FIREWALL to protect themselves.
I have noticed this before, but I haven't raised this issue, because I thought that it was just random attacks that occurred simply because I was on the Internet. But then I started to monitor it and noticed a correlation between my FR visits and various attacks.
Intruder "Y9K0E0" is most active and engages in the most agressive attempts. But others are involved. Has anyone else noticed this activity?
I'm safe, thanks to ZoneAlarm, the world's greatest freeware program.
Here's what my ports look like under netstat -an
C:\WINDOWS\Desktop>netstat -an Active Connections Proto Local Address Foreign Address State TCP 0.0.0.0:1030 0.0.0.0:0 LISTENING TCP 0.0.0.0:135 0.0.0.0:0 LISTENING TCP 0.0.0.0:5000 0.0.0.0:0 LISTENING TCP 63.155.104.7:9322 0.0.0.0:0 LISTENING TCP 63.155.104.7:139 0.0.0.0:0 LISTENING TCP 127.0.0.1:1026 0.0.0.0:0 LISTENING TCP 127.0.0.1:1029 0.0.0.0:0 LISTENING UDP 63.155.104.7:15483 *:* UDP 63.155.104.7:137 *:* UDP 63.155.104.7:138 *:* UDP 127.0.0.1:1616 *:* UDP 127.0.0.1:2132 *:* UDP 127.0.0.1:1900 *:*
Just now I got another probe. Does FR send to its clients? Jim Robinson?
The firewall has blocked Internet access to your computer (TCP Port 1433) from 203.248.195.112 (TCP Port 4132). Time: 10/19/2002 8:24:00
inetnum: 202.29.20.0 - 202.29.21.255
netname: RIUBON-TH
descr: Rajabhat Institute Ubonratchathani
country: TH
admin-c: PT3-AP
tech-c: PT3-AP
mnt-by: MAINT-TH-UNINET
changed: noc@uni.net.th 20020703
status: ALLOCATED PORTABLE
source: APNIC
person: Prayong Thitithananon
address: Rajabhat Institute Ubonratchathani
address: Jangsanit Rd., Ubonratchathani 34000
country: TH
phone: +66-45-262423-32
fax-no: +66-45-311472
nic-hdl: PT3-AP
mnt-by: MAINT-THAISARN-AP
changed: phong@inet.co.th 970218
source: APNIC
As somebody else pointed out, the request for a page does pass through a number of machines, and can be "sniffed" while it is on its way. Also, the act of requesting a page from a website MUST reveal your IP address to at least the site - that's how the site knows where to send the page. Most web-page servers keep a log of web-page requests, including date, time, and IP addy of requestor. Just FYI.
Personal firewalls are more important in keeping traffic from going out of your computer than from coming in. When up pops a flashy window telling you Keylogger is trying to make a connection to the Internet, and you don't recognize Keylogger as being an authorized program on your computer, then you have something to worry about.
As for attacks occurring when you're on FR-- that is probably just a coincidence. How much of your time is spent on FR vs other sites when you're connected to the Internet?
Also, a number of these warnings can be attributed to a failed www connection. See "False Positives". On some image-laden threads, your web browser may make dozens of www connections (one for each image on the thread.) Most of those connections go to other machines, some of which may be under stress and failing connections.
And, btw, your IP address will be leaked to other websites if you download images off those websites. It is easy enough for that to happen on FR, all one has to do is visit a thread with an image hosted on another website. Most images aren't downloaded from FR, and anybody can post a link to an image. This is not unique to FR, it is a fact of HTML life. If you are truely concerned, you can surf the Internet with images disabled, but really, there isn't much anybody will do with any random IP address they find downloading an image (especially when thousands of hits are recorded each day.) [BTW--people--don't link in images that are hosted on other people's servers unless you have permission.]
We have no software hosted on our machines (IP range 209.157.64.193-209.157.64.254) that will probe your machine when you contact FR. The absolute most that will probably never happen is an ICMP ping or traceroute from me if I'm tracing a network problem (I would likely pull a random address from FR's server, something I know is alive.) ICMP pings are very similar to sonar pings (measures roundtrip time of the "ping") and traceroute lists the network routers between two locations.
We keep our machines clean, there are no third parties messing around, no trojans on our site. We employ several mechanisms to verify the integrity of the system to ensure nobody is fooling around. We keep the software up-to-date with the latest patches as soon as they are made available. I keep an eye on the security portals that note "zero-day exploits." The number of network services we do run is minimal, there isn't much to exploit.
Man-in-the-middle attacks, where a hacker compromises a machine between you and the server, are incredibly rare and difficult. Almost all machines between you and the server are dedicated routers with little or no services to compromise. These are dedicated pieces of hardware with no other function than to move packets around, compromising one would be a difficult act, and the person that has the resources to do that is probably not going to be scanning personal computers.
Having said that, please do let me know if there is any suspicious activity, something that can be reproduced and that can be attributed to FR or any of my servers. Random occurances are most likely meaningless, either coincidence or noise.
Oh, my bad! I didn't actually see the ad, but my husband saw it multiple times. It irritated the heck out of him!
T2S, thanks for clearing that up.
"Should I be concerned?"
Not unless you are running SQL Server. That's the default port SQL Server uses for internet connections.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.