<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TCP Hijack - Insight required to investigate in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tcp-hijack-insight-required-to-investigate/m-p/2180264#M53869</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If this is a real TCP hijacking attempt then the internal IP is likely spoofed and therefore inaccurate.&amp;nbsp; The attacker may actually be at another IP address so this complicates investigating the machine itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As the sig description says, this signature does have the potential to false positive in some cases so it should only raise concern if you see other sig alerts firing in similar time windows.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Apr 2013 19:42:18 GMT</pubDate>
    <dc:creator>_____Adam</dc:creator>
    <dc:date>2013-04-04T19:42:18Z</dc:date>
    <item>
      <title>TCP Hijack - Insight required to investigate</title>
      <link>https://community.cisco.com/t5/network-security/tcp-hijack-insight-required-to-investigate/m-p/2180261#M53866</link>
      <description>&lt;P&gt;Event ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;1363209060027941200&lt;/P&gt;&lt;P&gt;Severity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;high&lt;/P&gt;&lt;P&gt;Host ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;XXXX-IPS&lt;/P&gt;&lt;P&gt;Application Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;sensorApp&lt;/P&gt;&lt;P&gt;Event Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;04/03/2013 16:56:55&lt;/P&gt;&lt;P&gt;Sensor Local Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;04/03/2013 11:26:55&lt;/P&gt;&lt;P&gt;Signature ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;3250&lt;/P&gt;&lt;P&gt;Signature Sub-ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;0&lt;/P&gt;&lt;P&gt;Signature Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;TCP Hijack&lt;/P&gt;&lt;P&gt;Signature Version&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;S667&lt;/P&gt;&lt;P&gt;Signature Details&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;TCP Hijack&lt;/P&gt;&lt;P&gt;Interface Group&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;vs0&lt;/P&gt;&lt;P&gt;VLAN ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;20&lt;/P&gt;&lt;P&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;ge0_0&lt;/P&gt;&lt;P&gt;Attacker IP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;AAAA&lt;/P&gt;&lt;P&gt;Protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;tcp&lt;/P&gt;&lt;P&gt;Attacker Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;61952&lt;/P&gt;&lt;P&gt;Attacker Locality&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;OUT&lt;/P&gt;&lt;P&gt;Target IP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;BBBB&lt;/P&gt;&lt;P&gt;Target Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;80&lt;/P&gt;&lt;P&gt;Target Locality&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;OUT&lt;/P&gt;&lt;P&gt;Target OS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;unknown unknown (relevant)&lt;/P&gt;&lt;P&gt;Actions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;ipLoggingActivated+denyPacketRequestedNotPerformed+logAttackerPacketsActivated+logVictimPacketsActivated&lt;/P&gt;&lt;P&gt;Risk Rating&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;TVR=medium ARR=relevant &lt;/P&gt;&lt;P&gt;Risk Rating Value&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;100&lt;/P&gt;&lt;P&gt;Threat Rating&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;100&lt;/P&gt;&lt;P&gt;Reputation &lt;/P&gt;&lt;P&gt;Context Data &lt;/P&gt;&lt;P&gt;Packet Data&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Ether: ---- Ethernet2 OSI=2 Frame #1 Captured on 2013-04-03 16:56:55.962 ---- &lt;/P&gt;&lt;P&gt;Ether: &lt;/P&gt;&lt;P&gt;Ether:&amp;nbsp;&amp;nbsp; dst =&amp;nbsp; 0:0:c:7:ac:5&lt;/P&gt;&lt;P&gt;Ether:&amp;nbsp;&amp;nbsp; src =&amp;nbsp; 0:13:c4:4e:2d:bf&lt;/P&gt;&lt;P&gt;Ether: proto =&amp;nbsp; 0x8100 "(VLAN) IEEE 802.1q"&lt;/P&gt;&lt;P&gt;Ether: &lt;/P&gt;&lt;P&gt;VLAN: ---- IEEE802dot1q IEEE=802.1q OSI=2 ---- &lt;/P&gt;&lt;P&gt;VLAN: &lt;/P&gt;&lt;P&gt;VLAN: flags = 0000000000010100 20&lt;/P&gt;&lt;P&gt;VLAN:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 000............. 0x0 = [priority]&lt;/P&gt;&lt;P&gt;VLAN:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ...0............ 0x0 = [cfi]&lt;/P&gt;&lt;P&gt;VLAN:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ....000000010100 20 = [id]&lt;/P&gt;&lt;P&gt;VLAN:&amp;nbsp; type =&amp;nbsp; 0x800 "(IP) Internet protocol (v4 or v6)"&lt;/P&gt;&lt;P&gt;VLAN: &lt;/P&gt;&lt;P&gt;IPv4: ---- IPv4 RFC=791 OSI=3 ---- &lt;/P&gt;&lt;P&gt;IPv4: &lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ver =&amp;nbsp; 4 "Internet Protocol version 4"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hlen =&amp;nbsp; 5 (20 bytes) "No IP options present"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tos = 00000000 0x0&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 000..... 0x0 = [precedence] "Routine"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ...0.... 0x0 = [delay] "Normal delay"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ....0... 0x0 = [throughput] "Normal throughput"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .....0.. 0x0 = [reliability] "Normal reliability"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ......00 0x0 = [reserved]&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; len =&amp;nbsp; 52 (32 bytes of data)&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; id =&amp;nbsp; 0x6c1&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp; flags = 010 0x2 (bit fields)&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.. 0x0 = [reserved]&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .1. 0x1 = [df] "Do not fragment"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ..0 0x0 = [mf] "no more fragments"&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp; offset =&amp;nbsp; 0 (0 bytes)&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ttl =&amp;nbsp; 127 (hops)&lt;/P&gt;&lt;P&gt;IPv4: protocol =&amp;nbsp; 6 "(TCP) Transmition Control Protocol (RFC793)"&lt;/P&gt;&lt;P&gt;IPv4: checksum =&amp;nbsp; 0x40ff&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp; saddr =&amp;nbsp; AAAA&lt;/P&gt;&lt;P&gt;IPv4:&amp;nbsp;&amp;nbsp;&amp;nbsp; daddr =&amp;nbsp; BBBB&lt;/P&gt;&lt;P&gt;IPv4: &lt;/P&gt;&lt;P&gt;TCP: ---- TCP RFC=793 OSI=4 ---- &lt;/P&gt;&lt;P&gt;TCP: &lt;/P&gt;&lt;P&gt;TCP: sport =&amp;nbsp; 61952&lt;/P&gt;&lt;P&gt;TCP: dport =&amp;nbsp; 80&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; seq =&amp;nbsp; 2512247734&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; ack =&amp;nbsp; 2410330435&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp; hlen =&amp;nbsp; 8 (32 bytes)&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; res =&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp; code = 010000 0x10&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0..... 0x0 = [urg]&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .1.... 0x1 = [ack] "Acknowledgement Field Significant"&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ..0... 0x0 = [psh]&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ...0.. 0x0 = [rst]&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ....0. 0x0 = [syn]&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .....0 0x0 = [fin]&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; win =&amp;nbsp; 65205 (bytes)&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; crc =&amp;nbsp; 0xb0d2 (CRC-16)&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; urg =&amp;nbsp; 0 (byte offset)&lt;/P&gt;&lt;P&gt;TCP: &lt;/P&gt;&lt;P&gt;TCP: Options: (12 bytes)&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; Opt #1: NOP(1) skipped 1 byte&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; Opt #2: NOP(1) skipped 1 byte&lt;/P&gt;&lt;P&gt;TCP:&amp;nbsp;&amp;nbsp; Opt #3: SACK Option(5) contains 0 blocks&lt;/P&gt;&lt;P&gt;TCP: &lt;/P&gt;&lt;P&gt;Data: 0000&amp;nbsp; 8f aa be a7 8f ab 8b 7f&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ........&lt;/P&gt;&lt;P&gt;Data:&lt;/P&gt;&lt;P&gt;Event Summary&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;0&lt;/P&gt;&lt;P&gt;Initial Alert &lt;/P&gt;&lt;P&gt;Summary Type &lt;/P&gt;&lt;P&gt;Final Alert &lt;/P&gt;&lt;P&gt;Event Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;New&lt;/P&gt;&lt;P&gt;Event Notes &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We got an alert like this. But struggling to find out whether its malignant traffic. Any help would be deeply appreciated&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:56:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-hijack-insight-required-to-investigate/m-p/2180261#M53866</guid>
      <dc:creator>omhariharan</dc:creator>
      <dc:date>2019-03-10T12:56:19Z</dc:date>
    </item>
    <item>
      <title>TCP Hijack - Insight required to investigate</title>
      <link>https://community.cisco.com/t5/network-security/tcp-hijack-insight-required-to-investigate/m-p/2180262#M53867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately this signature in particular cannot be easily determined from the information in the alert alone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the sig description:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Triggers when both streams of data within a TCP connection indicate that a TCP hijacking may have occurred. The current implementation of this signature does not detect all types of TCP hijacking and false positives may occur. Even when hijacking is discovered, little information is available to the operator other than the source and destination addresses and ports of the systems being affected.&amp;nbsp; TCP Hijacking may be used to gain illegal access to system resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This signature fires upon detecting old, out of sequence ack packets. The most common network event that may trigger this signature is an idle telnet session. The TCP Hijack attack is a low-probability, high level-of-effort event. If it is successfully launched it could lead to serious consequences, including system compromise. The source of these alarms should be investigated thoroughly before any actions are taken. Recommend security professional consultation to assist in the investigation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This signature functions in promiscuous mode. However, while monitoring utilizing in-line mode, this signature is automatically disabled due to the protection provided by 1300 series of signatures."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More information is needed to take any action here such as the type of the two machines involved (how are they typically used, are they end user/server machines, etc) and if this attack makes sense in that scenario or if it is likely a false positive from telnet or some sort of other network anomaly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Apr 2013 18:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-hijack-insight-required-to-investigate/m-p/2180262#M53867</guid>
      <dc:creator>_____Adam</dc:creator>
      <dc:date>2013-04-03T18:17:30Z</dc:date>
    </item>
    <item>
      <title>TCP Hijack - Insight required to investigate</title>
      <link>https://community.cisco.com/t5/network-security/tcp-hijack-insight-required-to-investigate/m-p/2180263#M53868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Adam. I have already read the signature information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any direction as to how to investigate for these kind of packets would be more helpful for me since I'm the security guy here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This definitely does not look like ordinary browsing traffic. The source was internal ip address and the destination was a public ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the first TCP Hijack I have received from this source IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Apr 2013 05:29:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-hijack-insight-required-to-investigate/m-p/2180263#M53868</guid>
      <dc:creator>omhariharan</dc:creator>
      <dc:date>2013-04-04T05:29:02Z</dc:date>
    </item>
    <item>
      <title>TCP Hijack - Insight required to investigate</title>
      <link>https://community.cisco.com/t5/network-security/tcp-hijack-insight-required-to-investigate/m-p/2180264#M53869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If this is a real TCP hijacking attempt then the internal IP is likely spoofed and therefore inaccurate.&amp;nbsp; The attacker may actually be at another IP address so this complicates investigating the machine itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As the sig description says, this signature does have the potential to false positive in some cases so it should only raise concern if you see other sig alerts firing in similar time windows.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Apr 2013 19:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-hijack-insight-required-to-investigate/m-p/2180264#M53869</guid>
      <dc:creator>_____Adam</dc:creator>
      <dc:date>2013-04-04T19:42:18Z</dc:date>
    </item>
  </channel>
</rss>

