<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RPC WinNuke  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084176#M78059</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My first thought is you need to find out which host it is. If you don't have authority to contact that person directly, I would find out their supervisor. They may have a virus on the machine, and may not be attacking it directly. Otherwise, if it's causing an issue with your server, I would block their address on that port until you resolve the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Dec 2008 14:40:54 GMT</pubDate>
    <dc:creator>John Blakley</dc:creator>
    <dc:date>2008-12-23T14:40:54Z</dc:date>
    <item>
      <title>RPC WinNuke</title>
      <link>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084175#M78057</link>
      <description>&lt;P&gt;Today we have been getting numerous RPC WinNuke id=3345 version=S226 type=other  created=20050318 alerts. The "attacker" has a private from a remote branch, going through LAN-LAN tunnel to the IPS to the active directory server, port 135. Is the attack designed to enter port 135 and create a DOS? Any suggestions how to respond to the above?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084175#M78057</guid>
      <dc:creator>saidfrh</dc:creator>
      <dc:date>2019-03-10T11:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: RPC WinNuke</title>
      <link>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084176#M78059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My first thought is you need to find out which host it is. If you don't have authority to contact that person directly, I would find out their supervisor. They may have a virus on the machine, and may not be attacking it directly. Otherwise, if it's causing an issue with your server, I would block their address on that port until you resolve the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Dec 2008 14:40:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084176#M78059</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2008-12-23T14:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: RPC WinNuke</title>
      <link>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084177#M78061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following is glance of the alerts.&lt;/P&gt;&lt;P&gt;RPC WinNuke  &lt;/P&gt;&lt;P&gt;marsCategory: DoS/Host  &lt;/P&gt;&lt;P&gt;attacker:   &lt;/P&gt;&lt;P&gt;addr: 10.x.5.3  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 4188  &lt;/P&gt;&lt;P&gt;target:   &lt;/P&gt;&lt;P&gt;addr: 192.168.yy.5  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 135  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RPC WinNuke  &lt;/P&gt;&lt;P&gt;DoS/Host     &lt;/P&gt;&lt;P&gt;attacker:   &lt;/P&gt;&lt;P&gt;addr: 10.x.5.3  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 4240  &lt;/P&gt;&lt;P&gt;target:   &lt;/P&gt;&lt;P&gt;addr: 192.168.yy.5  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 135  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Invalid Netbios Name  id=3357  version=S256  &lt;/P&gt;&lt;P&gt;Non A-Z character  &lt;/P&gt;&lt;P&gt;marsCategory: Info/Misc     &lt;/P&gt;&lt;P&gt;attacker:   &lt;/P&gt;&lt;P&gt;addr: 10.x.5.2  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 137  &lt;/P&gt;&lt;P&gt;target:   &lt;/P&gt;&lt;P&gt;addr: 192.168.yy.5  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 137  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Invalid Netbios Name  id=3357  version=S256  &lt;/P&gt;&lt;P&gt;Non A-Z character  &lt;/P&gt;&lt;P&gt;marsCategory: Info/Misc  &lt;/P&gt;&lt;P&gt;attacker:   &lt;/P&gt;&lt;P&gt;addr: 10.x.5.3  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 137  &lt;/P&gt;&lt;P&gt;target:   &lt;/P&gt;&lt;P&gt;addr: 192.168.yy.6  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 137  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RPC WinNuke  &lt;/P&gt;&lt;P&gt;DoS/Host  &lt;/P&gt;&lt;P&gt;attacker:   &lt;/P&gt;&lt;P&gt;addr: 10.x.5.3  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 4406  &lt;/P&gt;&lt;P&gt;target:   &lt;/P&gt;&lt;P&gt;addr: 192.168.yy.5  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 135  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Invalid Netbios Name  id=3357  version=S256  Non A-Z character  &lt;/P&gt;&lt;P&gt;marsCategory: Info/Misc    &lt;/P&gt;&lt;P&gt;attacker:   &lt;/P&gt;&lt;P&gt;addr: 10.x.5.2  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 137  &lt;/P&gt;&lt;P&gt;target:   &lt;/P&gt;&lt;P&gt;addr: 192.168.yy.5  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 137  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Invalid Netbios Name  id=3357  version=S256    &lt;/P&gt;&lt;P&gt;Non A-Z character  &lt;/P&gt;&lt;P&gt;marsCategory: Info/Misc    &lt;/P&gt;&lt;P&gt;attacker:   &lt;/P&gt;&lt;P&gt;addr: 10.x.5.2  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 0  &lt;/P&gt;&lt;P&gt;target:   &lt;/P&gt;&lt;P&gt;addr: 0.0.0.0  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 0  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RPC WinNuke  &lt;/P&gt;&lt;P&gt;marsCategory: DoS/Host    &lt;/P&gt;&lt;P&gt;attacker:   &lt;/P&gt;&lt;P&gt;addr: 10.xx.55.5  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 1080  &lt;/P&gt;&lt;P&gt;target:   &lt;/P&gt;&lt;P&gt;addr: 192.168.yy.4  locality=OUT  &lt;/P&gt;&lt;P&gt;port: 135  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; RPC WinNuke  &lt;/P&gt;&lt;P&gt; marsCategory: DoS/Host...  &lt;/P&gt;&lt;P&gt; attacker:   &lt;/P&gt;&lt;P&gt; addr: 10.xx.55.5  locality=OUT  &lt;/P&gt;&lt;P&gt; port: 1104  &lt;/P&gt;&lt;P&gt; target:   &lt;/P&gt;&lt;P&gt; addr: 192.168.yy.5  locality=OUT  &lt;/P&gt;&lt;P&gt; port: 135  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Dec 2008 17:05:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084177#M78061</guid>
      <dc:creator>saidfrh</dc:creator>
      <dc:date>2008-12-23T17:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: RPC WinNuke</title>
      <link>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084178#M78062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could put a sniffer on your server and see what else is going on. I don't know what else to tell you other than to find the computer(s) that's sending this, and make sure that they don't have any viruses, malware, and are up-to-date on all of their patches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Dec 2008 17:10:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084178#M78062</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2008-12-23T17:10:50Z</dc:date>
    </item>
    <item>
      <title>Re: RPC WinNuke</title>
      <link>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084179#M78064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My $.02 worth...you need to find this user and shut them down.  The 3357 alert is potentially more serious as it is indicative of an old (circa 2005) WINS buffer overflow attack.&lt;/P&gt;&lt;P&gt;That vulnerability should be patched by now, but the fact that there are non-printables in the exchange is suspicious.  You always have the fallback of opening a TAC case to request a False Positive determination along the lines of "Given the age of the covered vulnerability, the alarm is suspected to be a FP".  The signature team will request a pcap capture of the suspect data, just so you know.  They won't be able to do anything without it (in case your company policy does not allow for sending data to Cisco).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Dec 2008 17:47:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084179#M78064</guid>
      <dc:creator>scothrel</dc:creator>
      <dc:date>2008-12-23T17:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: RPC WinNuke</title>
      <link>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084180#M78066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. Will do.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Dec 2008 17:51:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084180#M78066</guid>
      <dc:creator>saidfrh</dc:creator>
      <dc:date>2008-12-23T17:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: RPC WinNuke</title>
      <link>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084181#M78067</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, I noted that your alarm dump showed two 10. sources attacking a single 192. victim, so consider that your remote site probably has a larger problem than just a single box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this doesn't ruin your holidays...&lt;/P&gt;&lt;P&gt;SC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Dec 2008 17:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084181#M78067</guid>
      <dc:creator>scothrel</dc:creator>
      <dc:date>2008-12-23T17:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: RPC WinNuke</title>
      <link>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084182#M78068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've seen this signature repeatedly fire falsely before. This signature is looking for a specific regex string and if it finds it, it is going to trigger.  The string in my case was represented by a DCERPC Bind request with version = 5, minor version = 0, and packet flags set to 0x03 or last and first frag flags are the only ones set.  TCP PSH flag also has to be set to meet this condition (and dest port 135), obviously.  But definitely enable "log pair" for this signature and get some captures of the traffic then go from there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Dec 2008 19:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084182#M78068</guid>
      <dc:creator>jnommensen</dc:creator>
      <dc:date>2008-12-23T19:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: RPC WinNuke</title>
      <link>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084183#M78069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is interesting.  I'll pass it on to the signature team.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Dec 2008 21:13:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084183#M78069</guid>
      <dc:creator>scothrel</dc:creator>
      <dc:date>2008-12-23T21:13:41Z</dc:date>
    </item>
    <item>
      <title>Re: RPC WinNuke</title>
      <link>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084184#M78070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The following are samples of the IPS alerts.&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1229364010346913710  vendor=Cisco  severity=high  &lt;/P&gt;&lt;P&gt;  originator:   &lt;/P&gt;&lt;P&gt;    hostId: IPS  &lt;/P&gt;&lt;P&gt;    appName: sensorApp  &lt;/P&gt;&lt;P&gt;    appInstanceId: 407  &lt;/P&gt;&lt;P&gt;  time: Dec 22, 2008 19:23:20 UTC  offset=0  timeZone=-8  &lt;/P&gt;&lt;P&gt;  signature:   description=RPC WinNuke  id=3345  version=S226  type=other  created=20050318  &lt;/P&gt;&lt;P&gt;    subsigId: 0  &lt;/P&gt;&lt;P&gt;    sigDetails: RPC WinNuke  &lt;/P&gt;&lt;P&gt;    marsCategory: DoS/Host  &lt;/P&gt;&lt;P&gt;  interfaceGroup: vs0  &lt;/P&gt;&lt;P&gt;  vlan: 0  &lt;/P&gt;&lt;P&gt;  participants:   &lt;/P&gt;&lt;P&gt;    attacker:   &lt;/P&gt;&lt;P&gt;      addr: 10.5..3  locality=OUT  &lt;/P&gt;&lt;P&gt;      port: 4188  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 192.168..5  locality=OUT  &lt;/P&gt;&lt;P&gt;      port: 135  &lt;/P&gt;&lt;P&gt;      os:   idSource=learned  type=windows-nt-2k-xp  relevance=relevant  &lt;/P&gt;&lt;P&gt;  alertDetails: InterfaceAttributes:  context="Unknown" physical="Unknown" backplane="GigabitEthernet0/1" ;  &lt;/P&gt;&lt;P&gt;  riskRatingValue: 70  targetValueRating=medium  attackRelevanceRating=relevant  &lt;/P&gt;&lt;P&gt;  threatRatingValue: 70  &lt;/P&gt;&lt;P&gt;  interface: GigabitEthernet0/1  context=Unknown  physical=Unknown  backplane=GigabitEthernet0/1  &lt;/P&gt;&lt;P&gt;  protocol: tcp  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1229364010346920068  vendor=Cisco  severity=medium  &lt;/P&gt;&lt;P&gt;  originator:   &lt;/P&gt;&lt;P&gt;    hostId: IPS  &lt;/P&gt;&lt;P&gt;    appName: sensorApp  &lt;/P&gt;&lt;P&gt;    appInstanceId: 407  &lt;/P&gt;&lt;P&gt;  time: Dec 22, 2008 21:14:25 UTC  offset=0  timeZone=-8  &lt;/P&gt;&lt;P&gt;  signature:   description=Invalid Netbios Name  id=3357  version=S256  type=other  created=20050629  &lt;/P&gt;&lt;P&gt;    subsigId: 0  &lt;/P&gt;&lt;P&gt;    sigDetails: Non A-Z character  &lt;/P&gt;&lt;P&gt;    marsCategory: Info/Misc  &lt;/P&gt;&lt;P&gt;  interfaceGroup: vs0  &lt;/P&gt;&lt;P&gt;  vlan: 0  &lt;/P&gt;&lt;P&gt;  participants:   &lt;/P&gt;&lt;P&gt;    attacker:   &lt;/P&gt;&lt;P&gt;      addr: 10.5..3  locality=OUT  &lt;/P&gt;&lt;P&gt;      port: 137  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 192.168..6  locality=OUT  &lt;/P&gt;&lt;P&gt;      port: 137  &lt;/P&gt;&lt;P&gt;      os:   idSource=learned  type=windows-nt-2k-xp  relevance=relevant  &lt;/P&gt;&lt;P&gt;  alertDetails: InterfaceAttributes:  context="Unknown" physical="Unknown" backplane="GigabitEthernet0/1" ;  &lt;/P&gt;&lt;P&gt;  riskRatingValue: 66  targetValueRating=medium  attackRelevanceRating=relevant  &lt;/P&gt;&lt;P&gt;  threatRatingValue: 66  &lt;/P&gt;&lt;P&gt;  interface: GigabitEthernet0/1  context=Unknown  physical=Unknown  backplane=GigabitEthernet0/1  &lt;/P&gt;&lt;P&gt;  protocol: udp  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Dec 2008 21:26:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpc-winnuke/m-p/1084184#M78070</guid>
      <dc:creator>saidfrh</dc:creator>
      <dc:date>2008-12-23T21:26:36Z</dc:date>
    </item>
  </channel>
</rss>

