<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ip local source spoof attack on ips in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ip-local-source-spoof-attack-on-ips/m-p/1780199#M56294</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Hi Prapanch,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;the ips logs for the attack is following..i used packet dispaly command on my senson but couldnt find any any mac address ...&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;participants:&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 127.0.0.1&amp;nbsp; locality=OUT&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 108.122.0.0&amp;nbsp; locality=OUT&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os:&amp;nbsp;&amp;nbsp; idSource=unknown&amp;nbsp; type=unknown&amp;nbsp; relevance=relevant&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; actions:&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; denyPacketRequestedNotPerformed: true&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; riskRatingValue: 100&amp;nbsp; targetValueRating=medium&amp;nbsp; attackRelevanceRating=relevant&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; threatRatingValue: 100&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol: IP protocol 0&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Regards&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Sher&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 14 Sep 2011 06:22:32 GMT</pubDate>
    <dc:creator>szamin125</dc:creator>
    <dc:date>2011-09-14T06:22:32Z</dc:date>
    <item>
      <title>Ip local source spoof attack on ips</title>
      <link>https://community.cisco.com/t5/network-security/ip-local-source-spoof-attack-on-ips/m-p/1780197#M56291</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hi Guys,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;we have ip local source spooof attack on our cisco ips the signature id on ips is 1104..what will be the proper metigation for this attack...&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Regards&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Sher&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:28:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-local-source-spoof-attack-on-ips/m-p/1780197#M56291</guid>
      <dc:creator>szamin125</dc:creator>
      <dc:date>2019-03-10T12:28:22Z</dc:date>
    </item>
    <item>
      <title>Ip local source spoof attack on ips</title>
      <link>https://community.cisco.com/t5/network-security/ip-local-source-spoof-attack-on-ips/m-p/1780198#M56292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are details of this signature:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=1104&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S2"&gt;http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=1104&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will want to track by using captures where the packets with a source of 127.0.0.1 are coming from (using MAC addresses). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the &lt;STRONG&gt;packet display&lt;/STRONG&gt; command on the sensor as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there are any layer 3 hops, you will again have to capture on that layer 3 device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 16:22:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-local-source-spoof-attack-on-ips/m-p/1780198#M56292</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2011-09-12T16:22:56Z</dc:date>
    </item>
    <item>
      <title>Ip local source spoof attack on ips</title>
      <link>https://community.cisco.com/t5/network-security/ip-local-source-spoof-attack-on-ips/m-p/1780199#M56294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Hi Prapanch,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;the ips logs for the attack is following..i used packet dispaly command on my senson but couldnt find any any mac address ...&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;participants:&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 127.0.0.1&amp;nbsp; locality=OUT&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 108.122.0.0&amp;nbsp; locality=OUT&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; os:&amp;nbsp;&amp;nbsp; idSource=unknown&amp;nbsp; type=unknown&amp;nbsp; relevance=relevant&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; actions:&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; denyPacketRequestedNotPerformed: true&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; riskRatingValue: 100&amp;nbsp; targetValueRating=medium&amp;nbsp; attackRelevanceRating=relevant&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; threatRatingValue: 100&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol: IP protocol 0&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Regards&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Sher&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 06:22:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-local-source-spoof-attack-on-ips/m-p/1780199#M56294</guid>
      <dc:creator>szamin125</dc:creator>
      <dc:date>2011-09-14T06:22:32Z</dc:date>
    </item>
    <item>
      <title>Ip local source spoof attack on ips</title>
      <link>https://community.cisco.com/t5/network-security/ip-local-source-spoof-attack-on-ips/m-p/1780200#M56296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sher,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try using the &lt;STRONG&gt;packet capture&lt;/STRONG&gt; command and then copy of the captured file to an ftp server and view it using wiresark. here's the document on using the packet capture command and also explains how to copy the capture file for analysis:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ips/5.0/configuration/guide/cli/clipack.html"&gt;http://www.cisco.com/en/US/docs/security/ips/5.0/configuration/guide/cli/clipack.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 14:22:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-local-source-spoof-attack-on-ips/m-p/1780200#M56296</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2011-09-14T14:22:27Z</dc:date>
    </item>
  </channel>
</rss>

