land attack

i see an impossible ip packet alert being triggered on the cisco ips sensors.  the traffic is from and to one of the domain controllers on udp port 138.  this may be indicative of land attack but it is happening on a couple of servers.  also, the servers are properly patched and nothing malacious was detected on the servers.  the other servers are not DCs.

does anyone know more about this?

thanks,
netgeek
net-geekAsked:
Who is Participating?
 
Rich RumbleSecurity SamuraiCommented:
There are false positives with most IDS and IPS systems, but this error has occured with Snort IDS sig's in the past
http://www.snort.org/archive-3-1767.html
http://support.microsoft.com/kb/188001

They could be spoofed, if possible, install wireshark (formerly ethereal) on the pc's in question and see if they are actaully sending that data, or span the port of these pc's to a sniffer to see if they are infact comming from that pc.
The LAND attack is a variation on the SYN attack. In the LAND attack, instead of sending
SYN packets with IP addresses that do not exist, the flood of SYN packets all have the same
spoof IP address—that of the targeted computer. The LAND attack can be prevented by filtering
out incoming packets for which source IP addresses appear to be from computers on the internal
network
-rich
0
 
net-geekAuthor Commented:
ok, thanks.
0
 
Rich RumbleSecurity SamuraiCommented:
Were you able to confirm that the traffic was definatly comming from the source that your IDS said it was? Just curious.
-rich
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.