NukeNabber FAQ

http://www.dynamsol.com/puppet/faqs/nnfaq.html
First Draft - Under Construction
Last updated on 8/21/1998

What is NukeNabber?
Where can I get the latest version?
Who is puppet?
Who or what is DSI?
What does NukeNabber do?
What doesn't NukeNabber do?
What is a nuke?
What is Denial of Service?
What is Winnuke/OOBNuke?
What is SSPING?
What is Teardrop?
What is Teardrop2, Bonk and Boink?
What is Land?
What is Click?
How do I protect myself?
How do I report an attack?
What are the default ports?
What other ports should I monitor?
Some of the default ports aren't involved with DoS attacks so why should I monitor them?
What are TCP, UDP and ICMP?
NukeNabber reports "Winsock does not support ICMP monitoring.", what does this mean?
NukeNabber reports "ICMP monitoring supported but unassigned.", what does this mean?
NukeNabber says that some of my ports are already in use, what does that mean?
I use a firewall or router, can I still use NukeNabber?
So if NukeNabber only monitors but doesn't block anything what good is it?
Where can I get a firewall or router?
How can I get tech support?
What is this "Buy a Brick" thing?
What is the future of NukeNabber?
What other programs has puppet written?
Is the source code available?
What language is NukeNabber written in?
What are the different Intelligence Reports?


What is NukeNabber? (or a brief history of NukeNabber)

NukeNabber was originally written as a response to the original Winnuke/OOBNuke in an attempt to catch people trying to crash my system. That attack only used port 139 tcp. It was soon discovered that other ports were vulnerable to similar attacks. Ports 138, 137 and 129 were quickly added. Then Port 53 tcp and 19 udp. Without knowing where this might end, I made sure plenty of ports could be added in the future.

I only intended NukeNabber to be used by myself until, in the course of testing it, other people wanted to use it. Almost all attacks at this time were conducted via IRC and were not spoofed. I decided that it would be useful to have NukeNabber communicate with my mIRC client to help manage the channels I opped in. Over the course of a year the program became more polished and useful but there are still many things I would like to add.

So why the name "NukeNabber"? Alliteration man! It's the *alliteration*! (said in best Tick voice)


Where can I get the latest version?

You can always find the latest version of NukeNabber by going to http://www.dynamsol.com/puppet/ or http://dynamsol.dyn.ml.org/puppet/

The latest version as of 8/21/1998 is 2.9


Who is puppet? (or a brief history of puppet)

I was born. My family got a computer for the family one xmas. My geek-genes awoke and transformed me into what I am today.


Who or what is DSI?

DSI stands for Dynamic Solutions International and was formed as a sole-proprietorship in 1985.


What does NukeNabber do?

NukeNabber listens on specified ports and for ICMP destination unreachable. Upon seeing a connection, it will wait ~10 seconds and read up to 1k of data. Any more than 1k is simply thrown away and the port is closed. Optionally, a sound is played, a message is sent to your irc client and various reports are generated in an attempt to gather information about the attacker.

There are some special conditions such as with ICMP dest_unreach. ICMP does not use ports and so it cannot be "shut down". NukeNabber simply ignores the incoming data for a specified amount of time to avoid being flooded.


What doesn't NukeNabber do?

NukeNabber does not act as a firewall. It will not block potentially damaging packets before they can crash your system. That is why you must be patched for NukeNabber to work.

The next planned version of NukeNabber will be able to block ports.


What is a nuke?

Without getting into silly hacker symantics, a nuke is a packet of a data constructed with the intention of sending it to a another computer and crashing it.


What is Denial of Service?

Denial of Service or DoS is attacking someone's system or systems with the intent of shutting them down. All nukes fall into this category as well as simple packet flooding. In the United States, Denial of Service is a crime under Title 18.


What is Winnuke/OOBNuke?

Winnuke is a packet constructed with an URGENT flag set and pointing to Out of Band data. This combination will crash unpatched Windows95 and WindowsNT machines.


What is SSPING?

SSPING sends a series of highly fragmented, oversized ICMP data packets over the connection. The system cannot re-assemble them fast enough and the computer freezes.


What is Teardrop?

This attack sends overlapping IP fragments that the system cannot re-assemble. The system will freeze.


What is Teardrop2, Bonk and Boink?

This attack sends a malformed UDP header causing the system to crash.


What is Land?

This attack tricks your computer into trying to negotiate a connection with itself. This negotiation loops and the system freezes.


What is Click?

This attack abuses a feature of the ICMP protocol and tries to convince your computer that is has lost its' connection. The computer then disconnects from the port specified.


How do I protect myself?

Install the patches for your OS. Consider using a firewall or router.


How do I report an attack?

If the ISP of the attacker is visible in the log, email to abuse@isp and/or root@isp.

for example:

[08/19/1998 18:50:38.109 GMT-0600] Connection: blah.quebectel.com (142.169.170.0) on port 139 (tcp).

You would send email to [email protected] and/or [email protected]

Sometimes the IP address is all you get. This is where the traceroute comes in handy from the Intelligence Reports.

[08/12/1998 22:28:37.734 GMT-0600] Connection: 200.224.242.48 on port 1080 (tcp).

[08/12/1998 22:28:37.890 GMT-0600]Report Generated for 200.224.242.48
TraceRoute:
1 grill (192.168.0.10)
2 tnt5.dfw5.da.uu.net (206.115.151.133)
3 e0-4.ar1.dfw5.da.uu.net (207.76.48.50)
4 351.ATM2-0-0.XR1.DFW4.Alter.Net (137.39.82.102)
5 146.188.240.62 (146.188.240.62)
6 108.ATM8-0-0.TR1.ATL1.ALTER.NET (146.188.136.25)
7 100.ATM9-0-0.XR1.ATL1.ALTER.NET (146.188.232.93)
8 195.ATM12-0-0.BR1.ATL1.ALTER.NET (146.188.232.49)
9 137.39.23.6 (137.39.23.6)
9 200.224.242.48 (200.224.242.48)
TraceRoute Complete.

In this case, you should send a log of the attack to [email protected] and/or [email protected].

Sometimes you can use the WHOIS report to get the exact person you should email your information to.

Comteck LLC (COMTECK-DOM)
210 N. Main
sweetser, IN 46987
us

Domain Name: COMTECK.COM

Administrative Contact:
Mark, Schultz (SM1002) [email protected]
(765)384-7873 (FAX) (765)384-7002
Technical Contact, Zone Contact:
Claussen, Kent (KC242) [email protected]
765-538-3738 (FAX) 765-538-3739
Billing Contact:
Mark, Schultz (SM1002) [email protected]
(765)384-7873 (FAX) (765)384-7002

Record last updated on 16-Apr-97.
Record created on 06-Dec-95.
Database last updated on 10-Aug-98 03:35:16 EDT.

Domain servers in listed order:

TONE.COMTECK.COM 209.45.185.2
PULSE.COMTECK.COM 209.45.185.5

With this information you can email your report directly to [email protected] and [email protected]

Rarely, you will get a valid finger response, the finger will give a list of users on the system at the time of the attack. This is invaluable information but most ISPs block it. When you do get it, include it with your report.

Sign your report with your real name and phone number. You want the ISP to take you seriously and they are less likely to do that if you don't use your real name and give them a way to contact you personally.


What are the default ports?

19 udp (chargen)
53 tcp (DNS)
129 tcp (undefined)
137 tcp (netbios name)
138 tcp (netbios datagram)
139 tcp (netbios session)

* ports obove 1024 are generally undefined *

1027,1029,1032 tcp (used to protect ICQ)
1080 tcp (used to detect wingate sniffers)
5000 tcp (used to detect and block Sokets de Trois v1)
50505 tcp (used to detect and block Sokets de Trois v2)
31337 udp (used to detect and block Back Orifice)


What other ports should I monitor?

You can monitor port 23 tcp to watch for people trying to telnet to you or port 21 to watch for ftp connections.


Some of the default ports aren't involved with DoS attacks so why should I monitor them?

Ports 19, 53, 129, 137, 138, 139 have been directly involved with DoS attacks.
Ports 1027,1029,1032m 1080, 5000, 50505, 31337 are often used by trojans so while they are not attacked they are often used.


What are TCP, UDP and ICMP?

TCP stands for Transport Control Protocol (more info)
UDP stands for User Datagram Protocol (more info)
ICMP stands for Internet Control Messaging Protocol (more info)


NukeNabber reports "Winsock does not support ICMP monitoring.", what does this mean?

For Windows95 users, only those who have upgraded to Winsock 2.2 can monitor ICMP.
Windows98 users should never see this message.
WindowsNT only allows users with Administrative access to monitor ICMP.


I use a firewall or router, can I still use NukeNabber?

NukeNabber can listen for syslog messages so if your firewall or router can send those then NukeNabber can still monitor ports.


So if NukeNabber only monitors but doesn't block anything what good is it?

It was my intention to make a detector and not a blocker from the beginning. It is my opinion that knowing your attacker is 90% of the battle. The next version of NukeNabber will provide the ability to block ports.


How can I get tech support?

You can email [email protected], join the discussion mailing list and/or log on to Undernet IRC and join #winnuke.


Is the source code available?

No.


What language is NukeNabber written in?

Borland Delphi 3