<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TCP-Hijack - triggers continuously in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tcp-hijack-triggers-continuously/m-p/2468048#M45801</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an IPS4270 appliance (IPS4270-20-K9) in IDS mode. I am getting continuous triggers on the TCP Hijack signature and the attacker is always the proxy server. with the target of various external addresses and 1 specific internal address hosting web services (ports 80 &amp;amp; 443). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=6822622857377&amp;nbsp; vendor=Cisco&amp;nbsp; severity=high&amp;nbsp; alarmTraits=2147516416&amp;nbsp; &lt;BR /&gt;&amp;nbsp; originator:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostId: PETROSA-PRW-IPS4270-IPS1&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appName: sensorApp&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appInstanceId: 1492&amp;nbsp; &lt;BR /&gt;&amp;nbsp; time: Feb 07, 2014 12:33:17 UTC&amp;nbsp; offset=120&amp;nbsp; timeZone=GMT+02:00&amp;nbsp; &lt;BR /&gt;&amp;nbsp; signature:&amp;nbsp;&amp;nbsp; description=TCP Hijack&amp;nbsp; id=3250&amp;nbsp; version=S739&amp;nbsp; type=anomaly&amp;nbsp; created=20010202&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subsigId: 0&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sigDetails: TCP Hijack&amp;nbsp; &lt;BR /&gt;&amp;nbsp; interfaceGroup: ServerVlan&amp;nbsp; &lt;BR /&gt;&amp;nbsp; vlan: 3&amp;nbsp; &lt;BR /&gt;&amp;nbsp; participants:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 10.0.2.111&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 65077&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 198.72.112.12&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 80&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os:&amp;nbsp;&amp;nbsp; idSource=unknown&amp;nbsp; type=unknown&amp;nbsp; relevance=relevant&amp;nbsp; &lt;BR /&gt;&amp;nbsp; actions:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; snmpTrapRequested: true&amp;nbsp; &lt;BR /&gt;&amp;nbsp; triggerPacket: &lt;BR /&gt;000000&amp;nbsp; 00 16 35 C2 39 87 00 24&amp;nbsp; 14 BF 2E C0 81 00 A0 03&amp;nbsp; ..5.9..$........&lt;BR /&gt;000010&amp;nbsp; 08 00 45 00 00 28 58 4A&amp;nbsp; 40 00 7F 06 60 C2 0A 00&amp;nbsp; ..E..(XJ@...`...&lt;BR /&gt;000020&amp;nbsp; 02 6F C6 48 70 0C FE 35&amp;nbsp; 00 50 8C DB EE A7 B9 AF&amp;nbsp; .o.Hp..5.P......&lt;BR /&gt;000030&amp;nbsp; CC 0E 50 10 80 52 EC F6&amp;nbsp; 00 00 00 00 00 00 00 00&amp;nbsp; ..P..R..........&lt;/P&gt;&lt;P&gt;&amp;nbsp; riskRatingValue: 100&amp;nbsp; targetValueRating=medium&amp;nbsp; attackRelevanceRating=relevant&amp;nbsp; &lt;BR /&gt;&amp;nbsp; threatRatingValue: 100&amp;nbsp; &lt;BR /&gt;&amp;nbsp; interface: ge3_0&amp;nbsp; &lt;BR /&gt;&amp;nbsp; protocol: tcp&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is this a false positive as it is triggering way too often and especially with it stating the proxy server as the attacker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 13:08:22 GMT</pubDate>
    <dc:creator>jodamus112</dc:creator>
    <dc:date>2019-03-10T13:08:22Z</dc:date>
    <item>
      <title>TCP-Hijack - triggers continuously</title>
      <link>https://community.cisco.com/t5/network-security/tcp-hijack-triggers-continuously/m-p/2468048#M45801</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an IPS4270 appliance (IPS4270-20-K9) in IDS mode. I am getting continuous triggers on the TCP Hijack signature and the attacker is always the proxy server. with the target of various external addresses and 1 specific internal address hosting web services (ports 80 &amp;amp; 443). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=6822622857377&amp;nbsp; vendor=Cisco&amp;nbsp; severity=high&amp;nbsp; alarmTraits=2147516416&amp;nbsp; &lt;BR /&gt;&amp;nbsp; originator:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostId: PETROSA-PRW-IPS4270-IPS1&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appName: sensorApp&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appInstanceId: 1492&amp;nbsp; &lt;BR /&gt;&amp;nbsp; time: Feb 07, 2014 12:33:17 UTC&amp;nbsp; offset=120&amp;nbsp; timeZone=GMT+02:00&amp;nbsp; &lt;BR /&gt;&amp;nbsp; signature:&amp;nbsp;&amp;nbsp; description=TCP Hijack&amp;nbsp; id=3250&amp;nbsp; version=S739&amp;nbsp; type=anomaly&amp;nbsp; created=20010202&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subsigId: 0&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sigDetails: TCP Hijack&amp;nbsp; &lt;BR /&gt;&amp;nbsp; interfaceGroup: ServerVlan&amp;nbsp; &lt;BR /&gt;&amp;nbsp; vlan: 3&amp;nbsp; &lt;BR /&gt;&amp;nbsp; participants:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 10.0.2.111&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 65077&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 198.72.112.12&amp;nbsp; locality=OUT&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 80&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os:&amp;nbsp;&amp;nbsp; idSource=unknown&amp;nbsp; type=unknown&amp;nbsp; relevance=relevant&amp;nbsp; &lt;BR /&gt;&amp;nbsp; actions:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; snmpTrapRequested: true&amp;nbsp; &lt;BR /&gt;&amp;nbsp; triggerPacket: &lt;BR /&gt;000000&amp;nbsp; 00 16 35 C2 39 87 00 24&amp;nbsp; 14 BF 2E C0 81 00 A0 03&amp;nbsp; ..5.9..$........&lt;BR /&gt;000010&amp;nbsp; 08 00 45 00 00 28 58 4A&amp;nbsp; 40 00 7F 06 60 C2 0A 00&amp;nbsp; ..E..(XJ@...`...&lt;BR /&gt;000020&amp;nbsp; 02 6F C6 48 70 0C FE 35&amp;nbsp; 00 50 8C DB EE A7 B9 AF&amp;nbsp; .o.Hp..5.P......&lt;BR /&gt;000030&amp;nbsp; CC 0E 50 10 80 52 EC F6&amp;nbsp; 00 00 00 00 00 00 00 00&amp;nbsp; ..P..R..........&lt;/P&gt;&lt;P&gt;&amp;nbsp; riskRatingValue: 100&amp;nbsp; targetValueRating=medium&amp;nbsp; attackRelevanceRating=relevant&amp;nbsp; &lt;BR /&gt;&amp;nbsp; threatRatingValue: 100&amp;nbsp; &lt;BR /&gt;&amp;nbsp; interface: ge3_0&amp;nbsp; &lt;BR /&gt;&amp;nbsp; protocol: tcp&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is this a false positive as it is triggering way too often and especially with it stating the proxy server as the attacker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-hijack-triggers-continuously/m-p/2468048#M45801</guid>
      <dc:creator>jodamus112</dc:creator>
      <dc:date>2019-03-10T13:08:22Z</dc:date>
    </item>
    <item>
      <title>TCP-Hijack - triggers continuously</title>
      <link>https://community.cisco.com/t5/network-security/tcp-hijack-triggers-continuously/m-p/2468049#M45805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jodamus112,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suggest to you please do somethings for your network security (Configure IPS in Inline mode), Attacker attack to your web server from external site. Also make sure the webserver Antivirus working properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regrads&lt;/P&gt;&lt;P&gt;Parosh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Feb 2014 13:51:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-hijack-triggers-continuously/m-p/2468049#M45805</guid>
      <dc:creator>Mizanul Islam</dc:creator>
      <dc:date>2014-02-07T13:51:15Z</dc:date>
    </item>
    <item>
      <title>Re: TCP-Hijack - triggers continuously</title>
      <link>https://community.cisco.com/t5/network-security/tcp-hijack-triggers-continuously/m-p/2468050#M45808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Parosh,&lt;BR /&gt;&lt;BR /&gt;Thanks for the feedback. Are you requesting that I test the IPS inline between Proxy server and external site. Or are you saying I must deploy like that permanently.&lt;BR /&gt;&lt;BR /&gt;Currently our proxy server is on our Local LAN, in a Server VLAN, and we are spanning the VLAN to the IPS port to detect the complete server VLAN. So won't be able to deploy inline and might be an issue to do this just for test purposes as it will not replicate the existing and current environment.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Julian&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Feb 2014 16:23:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-hijack-triggers-continuously/m-p/2468050#M45808</guid>
      <dc:creator>jodamus112</dc:creator>
      <dc:date>2014-02-07T16:23:07Z</dc:date>
    </item>
  </channel>
</rss>

