Solved

need help with wireshark

Posted on 2014-04-15
16
294 Views
Last Modified: 2014-05-12
Hi Experts,

I have to make a scan for Fortinet.
Now I have seen millions of broadcast queries on the network.
Most of them directly from one machine.
Can you help me to read and understand the content of it ?
Why this source MAC makes so many ARP requests ?
See the PIC.
Broadcast-Storm.JPG
0
Comment
Question by:Eprs_Admin
  • 6
  • 5
  • 3
  • +1
16 Comments
 
LVL 33

Expert Comment

by:Dave Howe
ID: 40001297
Usually? it isn't. The usual cause of a broadcast storm is a routing loop at layer 2 - i.e. switches hooked into each other so that there is more than one path between two routers, so broadcast traffic goes around and around...

many switches detect and block that (aka "spanning tree"), except when there is a vmware vswitch between them (which can route the traffic but blocks the packets loop detection detects)

check your architecture to see if you have a routing loop.
0
 

Author Comment

by:Eprs_Admin
ID: 40001381
ok, we found out, because we check the MAC addresses.
And two machines are causing this broadcast storm.
When we disconnect one machine, the broadcast storm ends.

What can it be on the machine ?
It is laptop.
0
 
LVL 57

Expert Comment

by:giltjr
ID: 40001494
You need to see what type of packets it is sending.

The one sample you gave was a ARP.  The host that sent it was trying to find out the MAC address for a IP host.  Sending ARP's is normal and ARPs are broadcasts.

Does his machine talk to a lot of hosts?

Does his machine do any type of network scanning?

Does his machine constantly send out ARP's or does it send out a bunch and then do nothing for awhile, then send out a bunch more?
0
 

Author Comment

by:Eprs_Admin
ID: 40001646
This machine sends out permanent ARP request.
This machines tries to ask each subnet, also subnets which are not configured and used.
No network scanner is installed or used.
what else can it be ?
0
 
LVL 57

Expert Comment

by:giltjr
ID: 40001672
A virus/worm.
0
 

Author Comment

by:Eprs_Admin
ID: 40001683
we have scanned with 3 differnet anti virus and rootkit scanner.
There is noting on it.

Why this nic is sending so many arp requests ?
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 40001739
try running Microsoft Network Monitor and/or ProcMon
0
 
LVL 57

Expert Comment

by:giltjr
ID: 40001748
What operating system is the laptop running?
0
Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 

Author Comment

by:Eprs_Admin
ID: 40001805
The OS is WIN7
0
 
LVL 25

Expert Comment

by:Fred Marshall
ID: 40002152
we have scanned with 3 different anti virus and rootkit scanner.
OK
There is noting on it.
Really, this conclusion should be:
None of the ones we used found anything.

I suggest you try some others.  I have cleaned machines where the 6th scanner found what was needed to be found.  At the same time, the first 5 were well-respected tools that I use most often.  NONE of them are perfect.
0
 
LVL 57

Expert Comment

by:giltjr
ID: 40002358
If you did not, I would also use something that you have to boot from CD or thumb drive.  Running a scanner under Windows, even in "safe" mode, does not always work.

Is there any other suspicious traffic other than the ARP's coming from his computer?  I would assume anything (virus or valid tool) that is sending out ARP's would want to use the results of those ARP's to do or look for something else.
0
 

Author Comment

by:Eprs_Admin
ID: 40043823
thanks
0
 
LVL 25

Assisted Solution

by:Fred Marshall
Fred Marshall earned 333 total points
ID: 40044809
HitManPro is a pretty good tool that can boot from a USB flash drive.  It's made to get things before they can start.
0
 
LVL 57

Assisted Solution

by:giltjr
giltjr earned 167 total points
ID: 40045084
I have used both:

Kaspersky Rescue Disk
F-Secure Rescue CD

If you have wired Internet access most of these will download the latest pattern files to scan with.
0
 

Author Comment

by:Eprs_Admin
ID: 40046951
I know HITMANPRO but not the boot version.
Where can I find it ?
0
 
LVL 25

Accepted Solution

by:
Fred Marshall earned 333 total points
ID: 40047257
You install HITMANPRO on a computer and there is a little running man icon at the bottom of the window (at least I think that's the control you need).  Anyway there's a utility in the program to write a boot version onto a USB Flash Drive.  It's very nicely packaged that way.

Then, when you boot the computer just make sure that a USB Flash Drive is possible to boot from.  Usually there's a boot menu that will allow you to select without changing BIOS settings.  HITMANPRO gives you 3 choices for the mode it works in.  #1 is "best", #2 is, well, #2 and #3 is the last resort.  In some or all of these cases it looks like Windows is booting thereafter but don't be alarmed.  When it starts to get going, HITMANPRO starts up.
I've seen quite a few where #1 didn't work and still got good results.
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now