• Follow the TCP stream from packet number 2168.
  • Use the following filter
  • Eli M. Dow 42474 Tuesday, April 6, 2004 Graduate Networks Projects: An Email Virus Let Loose




    Download 485.6 Kb.
    bet2/2
    Sana25.03.2020
    Hajmi485.6 Kb.
    #8803
    1   2
    Use the following filter: smtp.req.command contains "MAIL"
    This will show you the beginnings of all the mailing done from this machine once it was infected. Notice the email addresses used in the from field. Alpha, Beta, Delta, and Gamma were set up to actually be popped onto the corresponding host. The muppet based usernames were created simply to fill the addressbooks. Any email address consisting of something other than Greek letters or puppets were generated by the virus itself! This is done to spoof the from field.
    To get a better feel for what one of these spoofed messages looks like:

    Follow the TCP stream from packet number 2168.

    220 192.168.1.1 ESMTP Postfix

    EHLO nobelglobe.com

    250-192.168.1.1

    250-PIPELINING

    250-SIZE 10240000

    250-VRFY

    250-ETRN


    250-XVERP

    250 8BITMIME

    MAIL FROM:

    250 Ok


    RCPT TO:

    250 Ok


    DATA

    354 End data with .

    From: claudia@nobelglobe.com

    To: david@192.168.1.1

    Subject: Status

    Date: Thu, 1 Jan 2004 09:39:27 -0500

    MIME-Version: 1.0

    Content-Type: multipart/mixed;

    .boundary="----=_NextPart_000_0002_8625C44D.FE58B3E4"

    X-Priority: 3

    X-MSMail-Priority: Normal
    This is a multi-part message in MIME format.
    ------=_NextPart_000_0002_8625C44D.FE58B3E4

    Content-Type: text/plain;

    .charset="Windows-1252"

    Content-Transfer-Encoding: 7bit


    The message contains Unicode characters and has been sent as a binary attachment.

    ------=_NextPart_000_0002_8625C44D.FE58B3E4

    Content-Type: application/octet-stream;

    .name="document.zip"

    Content-Transfer-Encoding: base64

    Content-Disposition: attachment;



    .filename="document.zip"

    Use the following filter: smtp.req.command contains "EHLO"
    This trace will show you all the spoofed domains used by the worm. The only machines connected to the network this trace was conducted on, were assigned IP addresses matching 192.168.1.*
    There were spoofed domains include: rhinosoft.com, youropen.com, donotfightit.com, iloveitagain.com, i-wantmore.com, vijayaba.cse.mrt.ac.lk, yahoo.com, wazupper.com, and nobleglobe.com.
    Oddly enough, other emails appear in your inbox with spoofed addresses. How do I know they are spoofed? Well quite simply, since we set up the mail server and each account, and we know that there is no DNS used in this simulation, we can clearly see the odd looking email received immediately following the onslaught of automated SMTP sends performed by the worm. This email window also shows the valid contacts (recall valid contacts are those who are listed on page 2, and are coincidently all names of muppets.) for the host "delta".


    Download 485.6 Kb.
    1   2




    Download 485.6 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Eli M. Dow 42474 Tuesday, April 6, 2004 Graduate Networks Projects: An Email Virus Let Loose

    Download 485.6 Kb.