USA Linux Users Group Forum Index
Log in Register FAQ Memberlist Search USA Linux Users Group Forum Index Album

Using nmap to scan for the Conficker worm on your network.

 
Post new topic   Reply to topic   printer-friendly view    USA Linux Users Group Forum Index » System Administration and Security
View previous topic :: View next topic  
Author Message
crouse
Site Admin


Joined: 17 Apr 2024
Posts: 11833
Location: Iowa

PostPosted: Tue Mar 31, 2024 4:00 pm    Post subject: Using nmap to scan for the Conficker worm on your network. Reply with quote

Sometimes we have to protect our networks from nasties, conficker may be one of those, yet to be determined.
However, better prepared than not. confiker is of course a "windows" worm/virus (whatever you want to call it), but having a Linux machine available to scan the network is of course "A Good Thing".

My quick rundown on finding this bugger on your network:

Download nmap 4.85BETA5
http://download.insecure.org/nmap-dist/nmap-4.85BETA5.tar.bz2

Code:
bzip2 -cd nmap-4.85BETA5.tar.bz2 | tar xvf -
cd nmap-4.85BETA5
./configure
make
su root
make install

To scan for Conficker, use a command such as:
nmap -PN -T4 -p139,445 -n -v --script=smb-check-vulns --script-args safe=1 [targetnetworks]


http://seclists.org/nmap-dev/2009/q1/0869.html
http://download.insecure.org/nmap-dist/

How to use Nmap to scan very large networks for Conficker
http://seclists.org/nmap-dev/2009/q1/0869.html

I highlighted the "interesting sections you should look for on your scans in red.

Quote:
Nmap version 4.85BETA5 ( http://nmap.org )
45 \use@Jughead ~]$ /usr/local/bin/nmap -sC --script=smb-check-vulns --script-args=safe=1 -p4
> -d -PN -n -T4 --min-hostgroup 256 --min-parallelism 64 \
> -oA conficker_scan 192.168.1.1-24

Warning: You specified a highly aggressive --min-hostgroup.

Starting Nmap 4.85BETA5 ( http://nmap.org ) at 2024-03-31 10:16 CDT
--------------- Timing report ---------------
hostgroups: min 256, max 100000
rtt-timeouts: init 500, min 100, max 1250
max-scan-delay: TCP 10, UDP 1000
parallelism: min 64, max 64
max-retries: 6, host-timeout: 0
min-rate: 0, max-rate: 0
---------------------------------------------
Initiating Connect Scan at 10:16
Scanning 24 hosts [1 port/host]
Discovered open port 445/tcp on 192.168.1.5
Increased max_successful_tryno for 192.168.1.5 to 1 (packet drop)
Completed Connect Scan at 10:16, 0.20s elapsed (24 total ports)
Overall sending rates: 223.92 packets / s.
NSE: Initiating script scanning.
NSE: Script scanning 24 hosts.
NSE: Initialized 1 rules
NSE: Matching rules.
NSE: Running scripts.
NSE: Runlevel: 2.000000
Initiating NSE at 10:16
Running 1 script threads:
NSE (0.397s): Starting smb-check-vulns against 192.168.1.5.
NSE: SMB: Extended login as \guest failed (NT_STATUS_NO_LOGON_SERVERS)
NSE: SMB: Extended login as \<blank> succeeded
NSE (3.026s): Finished smb-check-vulns against 192.168.1.5.
Completed NSE at 10:16, 2.63s elapsed
NSE: Script scanning completed.
Host 192.168.1.1 appears to be up ... good.
Scanned at 2024-03-31 10:16:26 CDT for 0s
Interesting ports on 192.168.1.1:
PORT STATE SERVICE REASON
445/tcp closed microsoft-ds conn-refused
Final times for host: srtt: 1317 rttvar: 5000 to: 100000

Host 192.168.1.2 appears to be up ... good.
Scanned at 2024-03-31 10:16:26 CDT for 1s
Interesting ports on 192.168.1.2:
PORT STATE SERVICE REASON
445/tcp filtered microsoft-ds no-response
Final times for host: srtt: -1 rttvar: -1 to: 500000

Host 192.168.1.3 appears to be up ... good.
Scanned at 2024-03-31 10:16:26 CDT for 0s
Interesting ports on 192.168.1.3:
PORT STATE SERVICE REASON
445/tcp closed microsoft-ds conn-refused
Final times for host: srtt: 565 rttvar: 5000 to: 100000

Host 192.168.1.4 appears to be up ... good.
Scanned at 2024-03-31 10:16:26 CDT for 1s
Interesting ports on 192.168.1.4:
PORT STATE SERVICE REASON
445/tcp filtered microsoft-ds no-response
Final times for host: srtt: -1 rttvar: -1 to: 500000

Host 192.168.1.5 appears to be up ... good.
Scanned at 2024-03-31 10:16:26 CDT for 3s
Interesting ports on 192.168.1.5:
PORT STATE SERVICE REASON
445/tcp open microsoft-ds syn-ack

Host script results:
| smb-check-vulns:
| MS08-067: NOT RUN
| Conficker: Likely CLEAN
|_ regsvc DoS: NOT RUN (add --script-args=unsafe=1 to run)
Final times for host: srtt: 3977 rttvar: 5000 to: 100000


Host 192.168.1.6 appears to be up ... good.
Scanned at 2024-03-31 10:16:26 CDT for 0s
Interesting ports on 192.168.1.6:
PORT STATE SERVICE REASON
445/tcp closed microsoft-ds conn-refused
Final times for host: srtt: 1728 rttvar: 5000 to: 100000

Host 192.168.1.7 appears to be up ... good.
Scanned at 2024-03-31 10:16:26 CDT for 1s
Interesting ports on 192.168.1.7:
PORT STATE SERVICE REASON
445/tcp filtered microsoft-ds no-response
Final times for host: srtt: -1 rttvar: -1 to: 500000



_________________
Veronica - Arch Linux 64-bit -- Kernel 2.6.33.4-1
Archie/Jughead - Arch Linux 32-bit -- Kernel 2.6.33.4-1
Betty/Reggie - Arch Linux (VBox) 32-bit -- Kernel 2.6.33.4-1
BumbleBee - OpenSolaris-SunOS 5.11
Back to top
View user's profile Send private message Visit poster's website AIM Address
mushroom
Ultimate Member


Joined: 29 Jun 2024
Posts: 2129
Location: Queen Charlotte B. C. Canada

PostPosted: Tue Mar 31, 2024 5:26 pm    Post subject: Reply with quote

Looks like good info.

thanks crouse Smile

I am passing this on to my ISP



_________________
SuSE 8.0, 8.2, 9.0, 9.1, 9.2, 9.3, 10.0, 10.1, 10.2, 10.3, 11.0, 11.1
Live CDs Mepis 8.0, Puppy 4.3.1, netbook- Zenwalk 6.2
Back to top
View user's profile Send private message Visit poster's website
platinummonkey
Advanced Member


Joined: 01 Mar 2024
Posts: 732
Location: Texas

PostPosted: Tue Mar 31, 2024 7:11 pm    Post subject: Reply with quote

heh, im excited when the day comes tbh Razz I'm going to grab a beer, sit back, watch networks and laugh at whatever happens Very Happy Razz

No offense to those infected; but, blame m$ not me Razz



_________________
desktop - FreeBSD 7.2
laptop & server - Archlinux i686 kernel26 2.6.32.10-1
- TAMULinux-2.0.2-ALPHA
USB Boot - Archlinux i686 kernel26 2.6.32.10-1 USB boot
Back to top
View user's profile Send private message Visit poster's website AIM Address
crouse
Site Admin


Joined: 17 Apr 2024
Posts: 11833
Location: Iowa

PostPosted: Tue Mar 31, 2024 8:33 pm    Post subject: Reply with quote

http://lastwatchdog.com/evolution-conficker-globe-spanning-worm/



_________________
Veronica - Arch Linux 64-bit -- Kernel 2.6.33.4-1
Archie/Jughead - Arch Linux 32-bit -- Kernel 2.6.33.4-1
Betty/Reggie - Arch Linux (VBox) 32-bit -- Kernel 2.6.33.4-1
BumbleBee - OpenSolaris-SunOS 5.11
Back to top
View user's profile Send private message Visit poster's website AIM Address
mushroom
Ultimate Member


Joined: 29 Jun 2024
Posts: 2129
Location: Queen Charlotte B. C. Canada

PostPosted: Tue Mar 31, 2024 9:39 pm    Post subject: Reply with quote

platinummonkey wrote:
heh, im excited when the day comes tbh Razz I'm going to grab a beer, sit back, watch networks and laugh at whatever happens Very Happy Razz

No offense to those infected; but, blame m$ not me Razz

Looks like you are not the only one that kind of attitude Laughing Laughing Laughing

Quote:
Conficker: GNU/Linux's way to mainstream

I personally hope that the Conficker/Downup/Downadup/Kido computer worm — that surfaced in October 2024 and targets the Microsoft Windows operating system, that activates on April 1st — shows Windows users just how insecure the Windows operating system is, and how slow Microsoft is to react to it, and “patch” it.

The Windows operating system has always been insecure — and I don’t mean as in self-esteem, although :b

When hundreds of businesses stop production because of this worm; people should think about an alternative OS. And, the GNU Operating System is the best choice.

More: http://jakedth.tumblr.com/post/91483836/conficker-gnu-linuxs-way-to-mainstream



_________________
SuSE 8.0, 8.2, 9.0, 9.1, 9.2, 9.3, 10.0, 10.1, 10.2, 10.3, 11.0, 11.1
Live CDs Mepis 8.0, Puppy 4.3.1, netbook- Zenwalk 6.2
Back to top
View user's profile Send private message Visit poster's website
jada
Linux Guru


Joined: 13 May 2024
Posts: 3064
Location: Sun City, CA 92585

PostPosted: Tue Mar 31, 2024 10:02 pm    Post subject: Reply with quote

Quote:

Honeynet Project Blog

As a result of the latest KYE paper (Containing Conficker), many of the scanner tools out there have implemented (or are in the process of doing so) the method presented in chapter 5 of the paper, which explains basically how you may remotely scan a machine, and have the machine tell you whether or not Conficker has compromised the system. The method works for all current Conficker variants and is indiscriminate of the infection vector!

Nmap was one of the first tools to implement this. Lets try it out!

Download the latest development release nmap-4.85BETA5.tar.bz2 and the usual configure, make, sudo make install should to the trick, but in case you run into compile- or run-time errors you may want to check out this page. (If you face run-time complaints about openssl, you should follow this link). There’s also binaries available for Windows and OSX.

The following is an example of a basic scan for conficker

nmap -sC -PN -d -p445 --script=smb-check-vulns \
--script-args=safe=1 192.168.1.1

For large-scale scans, you may invoke nmap with some optimisations parameters as recommended here.

nmap -sC -PN -d -p445 -n -T4 --min-hostgroup 256 \
--min-parallelism 64 --script=smb-check-vulns \
--script-args=safe=1 10.0.0.0/8

In addition to the no-ping (PN) and port specific scan (p) we added no-dns-resolution (n), more aggressive timing controls (T) and parallel scanning with group of 256 hosts (with at least 64 simultaneously). The two latter parameters may be tuned even further for increased performance. The recommendation is to maintain a 4:1 ratio between the two values, and keep the upper limit to 4096/1024.

Using safe=1 as an argument sent to the script, the MS08-067 vulnerability is not really checked. Using unsafe=1 and it will be checked, however be aware of a possibility that the vulnerable server service may crash.

Here are some examples of the output from the script smb-check-vulns (with MS08-067 check enabled):
| MS08-067: LIKELY VULNERABLE (host stopped responding) | Conficker: Likely INFECTED | MS08-067: FIXED | Conficker: Likely CLEAN

…So, scan your network now, while it’s still possible.
http://www.honeynet.org/



_________________
openSUSE 11.1 Desktop KDE 4.3.1 buildservice Factory
Linux Mint 7 Desktop Gnome
Back to top
View user's profile Send private message Send e-mail Visit poster's website AIM Address Yahoo Messenger MSN Messenger
melloe
Ultimate Member


Joined: 20 Mar 2024
Posts: 2262
Location: Southern Illinois

PostPosted: Thu Apr 16, 2024 2:19 pm    Post subject: Reply with quote

http://www.heise.de/security/dienste/browsercheck/tests/conficker/conficker_e.shtml



_________________
mell0: 1. Kubuntu, XP, Sabayon 2. Mandriva,Mint, Mephis
Thor: 1. VISTA, Fedora 2. Chakra, Debian
Sam:XP, SuSE Zues: win7, SuSE testing
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic   Reply to topic   printer-friendly view    USA Linux Users Group Forum Index » System Administration and Security All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All content © 2024-2009 - Usa Linux Users Group
This forum is powered by phpBB. © 2024-2009 phpBB Group
Theme created by phpBBStyles.com and modified by Crouse