Funny story about port 31337...

Funny story about port 31337...

Post by flat1in » Mon, 27 Aug 2001 15:14:01



Hey everyone,

    First, I've been lurking on this group for some time and just wanted to
say hi and thanks for all of the knowledge that I've gleaned from this NG.
Second, I wanted to relay a funny story that happened to me.  Ok, so I'll be
the first to admit that I'm not the most knowledgable person when it comes
to complex firewall systems - most of the stuff I do involves either VERY
lax or VERY strict security, which are both pretty easy to set up.  On my
home network, I am running various services on various ports on various
machines, so port mapping and route tables are a bit more complex.  After I
had everything set up, I began to test it.  Those of you "in the know" will
probably begin to see where this is going when I mention the fact that I was
running portsentry on the box being tested.  nmap -sT localhost returned a
SHITLOAD of open ports, including 31337.  I called both of my roommates who
were at work and DEMANDED to know what the hell they had been doing on that
*ing box the night before.  Both of them freaked out when I told them the
port number.  After I had them both pretty nervous, I decided to hit deja
and try to figure out exactly *which* one of them I should beat.  After the
first few posts, I realized my folly, disabled portsentry and re-scanned.
Lesson learned: Don't freak until AFTER you've had enough coffee to wake up
and properly research a problem.

Mark

 
 
 

Funny story about port 31337...

Post by Henk Schaefe » Tue, 28 Aug 2001 23:38:42


What would bother me personally is the fact that both roommates reacted
nervous ;)


Quote:> Hey everyone,

>     First, I've been lurking on this group for some time and just wanted
to
> say hi and thanks for all of the knowledge that I've gleaned from this NG.
> Second, I wanted to relay a funny story that happened to me.  Ok, so I'll
be
> the first to admit that I'm not the most knowledgable person when it comes
> to complex firewall systems - most of the stuff I do involves either VERY
> lax or VERY strict security, which are both pretty easy to set up.  On my
> home network, I am running various services on various ports on various
> machines, so port mapping and route tables are a bit more complex.  After
I
> had everything set up, I began to test it.  Those of you "in the know"
will
> probably begin to see where this is going when I mention the fact that I
was
> running portsentry on the box being tested.  nmap -sT localhost returned a
> SHITLOAD of open ports, including 31337.  I called both of my roommates
who
> were at work and DEMANDED to know what the hell they had been doing on
that
> *ing box the night before.  Both of them freaked out when I told them
the
> port number.  After I had them both pretty nervous, I decided to hit deja
> and try to figure out exactly *which* one of them I should beat.  After
the
> first few posts, I realized my folly, disabled portsentry and re-scanned.
> Lesson learned: Don't freak until AFTER you've had enough coffee to wake
up
> and properly research a problem.

> Mark


 
 
 

Funny story about port 31337...

Post by Robert Berr » Wed, 29 Aug 2001 12:55:37


On Sun, 26 Aug 2001 01:14:01 -0500, "flat1ine"


>  ... intereting post about discovering open port 31337 deleted ...

OK, maybe I'm a little dense here.  You discovered a machine listening
on port 31337.  Unless I'm missing something you have a machine that
has been trojaned with BackOrifice.  I'd still want to know what my
roommates had been doing that allowed the trojan in.

This is very different that being scanned for something listening on
port 31337 (I see that in my firewall logs all the time.)

Am I confused here?

Later,
Bob

 
 
 

Funny story about port 31337...

Post by Hal Burgi » Wed, 29 Aug 2001 13:04:28


On Mon, 27 Aug 2001 22:55:37 -0500, Robert Berry


>Am I confused here?

It was *portsentry* listening. That's how it works.

--
Hal B




--

 
 
 

Funny story about port 31337...

Post by Luke Voge » Wed, 29 Aug 2001 13:30:03



> OK, maybe I'm a little dense here.  You discovered a machine listening
> on port 31337.  Unless I'm missing something you have a machine that
> has been trojaned with BackOrifice.  I'd still want to know what my
> roommates had been doing that allowed the trojan in.

ermmm ... yep & yep ... you missed something.  Read the whole post.

--
Regards
Luke
------
Q:  What does FAQ stand for?
A:  We are Frequently Asked this Question, and we have no idea.
------
C.O.L.S FAQ - http://www.linuxsecurity.com/docs/colsfaq.html
------
PLEASE NOTE: Spamgard (tm) installed.

------

 
 
 

Funny story about port 31337...

Post by Rudolf Polze » Wed, 29 Aug 2001 13:33:22



>  On Sun, 26 Aug 2001 01:14:01 -0500, "flat1ine"

> >  ... intereting post about discovering open port 31337 deleted ...

>  OK, maybe I'm a little dense here.  You discovered a machine listening
>  on port 31337.  Unless I'm missing something you have a machine that
>  has been trojaned with BackOrifice.  I'd still want to know what my
>  roommates had been doing that allowed the trojan in.

No. Mine listens on 31337 - and it is only FakeBO.

--
2.4.5 in drivers/nubus/nubus.c:
  (777): Bwahahahaha...
  (782): Even more evil laughter...

 
 
 

Funny story about port 31337...

Post by . » Thu, 30 Aug 2001 04:12:32



Quote:> OK, maybe I'm a little dense here.  You discovered a machine listening
> on port 31337.

The part you missed was the OP was running Portsentry, which
listens for connections (appears open from outside) on port 31337
when using the -tcp command line switch.

This topic comes up every 2-3 weeks on this NG, it's
a FAQ candidate.

DoT

 
 
 

Funny story about port 31337...

Post by Chris Ventur » Thu, 30 Aug 2001 05:19:39


Quote:

>     First, I've been lurking on this group for some time and just wanted
to
> say hi and thanks for all of the knowledge that I've gleaned from this NG.
> Second, I wanted to relay a funny story that happened to me.  Ok, so I'll
be
> the first to admit that I'm not the most knowledgable person when it comes
> to complex firewall systems - most of the stuff I do involves either VERY
> lax or VERY strict security, which are both pretty easy to set up.  On my
> home network, I am running various services on various ports on various
> machines, so port mapping and route tables are a bit more complex.  After
I
> had everything set up, I began to test it.  Those of you "in the know"
will
> probably begin to see where this is going when I mention the fact that I
was
> running portsentry on the box being tested.  nmap -sT localhost returned a
> SHITLOAD of open ports, including 31337.  I called both of my roommates
who
> were at work and DEMANDED to know what the hell they had been doing on
that
> *ing box the night before.  Both of them freaked out when I told them
the
> port number.  After I had them both pretty nervous, I decided to hit deja
> and try to figure out exactly *which* one of them I should beat.  After
the
> first few posts, I realized my folly, disabled portsentry and re-scanned.
> Lesson learned: Don't freak until AFTER you've had enough coffee to wake
up
> and properly research a problem.

If you run Portsentry in it's Native mode, your ports being listened to will
be binded.  Therefor port 31337 will show up and show up on a scan.  I run
my portsentry in stcp, and sudp (Stealth) mode, so they don't show up.

BTW, I have a story pretty similar to yours, and this is how I discovered
the very awesome use of the other portsentry options. :)

CV-64

 
 
 

1. port 31337 w/ nmap

When I have "net.inet.tcp.blackhole: 2" set, nmap shows the following:
31337/tcp  filtered    Elite  

(other ports I have accessible from the outside are identd, domain (DNS)
and ssh).

Full output from outside the firewall:
(The 1598 ports scanned but not shown below are in state: closed)
Port       State       Service
22/tcp     open        ssh                    
53/tcp     open        domain                  
113/tcp    open        auth              

When I set the value to "0", this doesn't show up. I haven't seen any
evidence that I have been h4x0r3d, but this is a little unsettling... is
this a sort-of-funny joke in FreeBSD (or nmap), or should I be
concerned? I cannot see this port in netstat output (even if I copy the
netstat binary from another fbsd 4.8 machine), nor can I connect to it
from localhost or from outside. I do not, however, see this behavior
with another 4.8 box.

FreeBSD 4.8; nmap v 3.00.

--
No copies, please.
To reply privately, simply reply; don't remove anything.

2. How to debug a core file

3. UDP port 31337 probes?

4. Linux to mount, read & write VFAT ?

5. Chkrootkit--bindshell INFECTED (ports: 31337)

6. Videos not playing on the GeForce 4 MX 440?

7. Port 31337

8. Faulty error message re. /var ?

9. Need help ... Port 31337

10. UDP port 31337 probes?

11. funny FUNNY MS story

12. Funny Computer Show Story

13. Funny Story about member at my ISP