[144224] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

DDoS - CoD?

daemon@ATHENA.MIT.EDU (BH)
Tue Sep 6 03:55:04 2011

Date: Tue, 06 Sep 2011 15:53:38 +0800
From: BH <lists@blackhat.bz>
To: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Hi all,

I am wondering if anyone has seen a large DDoS before, specifically on
port 80 UDP with data that seems to be relating to Call of Duty 4. I did
a quick packet capture, and the payload looks like this:

14:50:42.716247 IP Y1.YY.YY.YY.28960 > XX.XX.XX.XX.80: UDP, length 499
        0x0000:  4500 020f 0000 4000 2a11 5203 58bf 8138  E.....@.*.R.X..8
        0x0010:  cbaa 5739 7120 0050 01fb 3e2e ffff ffff  ..W9q..P..>.....
        0x0020:  7374 6174 7573 5265 7370 6f6e 7365 0a5c  statusResponse.\
        0x0030:  5f41 646d 696e 5c6b 696c 6c6b 7574 6572  _Admin\killkuter
        0x0040:  5c5f 456d 6169 6c5c 6b69 6c6c 6b75 7465  \_Email\killkute
        0x0050:  7240 686f 746d 6169 6c2e 636f 6d5c 5f4c  r@hotmail.com\_L
        0x0060:  6f63 6174 696f 6e5c 4652 5c5f 6d61 6e75  ocation\FR\_manu
        0x0070:  6164 6d69 6e6d 6f64 5c30 2e31 312e 3320  adminmod\0.11.3.
        0x0080:  6265 7461 5c5f 5765 6273 6974 655c 6874  beta\_Website\ht
        0x0090:  7470 3a2f 2f77 7777 2e73 7974 2e74 6561  tp://www.syt.tea
        0x00a0:  6d2e 7374 5c67 5f63 6f6d 7061 7373 5368  m.st\g_compassSh
        0x00b0:  6f77 456e 656d 6965 735c 305c 675f 6761  owEnemies\0\g_ga
        0x00c0:  6d65 7479 7065 5c77 6172 5c67 616d 656e  metype\war\gamen
        0x00d0:  616d 655c 4361 6c6c 206f 6620 4475 7479  ame\Call.of.Duty
        0x00e0:  2034 5c6d 6170 6e61 6d65 5c6d 705f 626c  .4\mapname\mp_bl
        0x00f0:  6f63 5c70 726f 746f 636f 6c5c 365c 7368  oc\protocol\6\sh
        0x0100:  6f72 7476 6572 7369 6f6e 5c31 2e37 5c73  ortversion\1.7\s
        0x0110:  765f 616c 6c6f 7741 6e6f 6e79 6d6f 7573  v_allowAnonymous
        0x0120:  5c30 5c73 765f 6469 7361 626c 6543 6c69  \0\sv_disableCli
        0x0130:  656e 7443 6f6e 736f 6c65 5c30 5c73 765f  entConsole\0\sv_
        0x0140:  666c 6f6f 6470 726f 7465 6374 5c31 5c73  floodprotect\1\s
        0x0150:  765f 686f 7374 6e61 6d65 5c5e 3120 5359  v_hostname\^1.SY
        0x0160:  5420 2d20 5e33 5444 4d20 4843 202d 205e  T.-.^3TDM.HC.-.^
        0x0170:  3120 6372 6163 6b20 5c73 765f 6d61 7863  1.crack.\sv_maxc
        0x0180:  6c69 656e 7473 5c32 305c 7376 5f6d 6178  lients\20\sv_max
        0x0190:  5069 6e67 5c31 3530 5c73 765f 6d61 7852  Ping\150\sv_maxR
        0x01a0:  6174 655c 3235 3030 305c 7376 5f6d 696e  ate\25000\sv_min
        0x01b0:  5069 6e67 5c30 5c73 765f 7072 6976 6174  Ping\0\sv_privat
        0x01c0:  6543 6c69 656e 7473 5c36 5c73 765f 7075  eClients\6\sv_pu
        0x01d0:  6e6b 6275 7374 6572 5c30 5c73 765f 7075  nkbuster\0\sv_pu
        0x01e0:  7265 5c31 5c73 765f 766f 6963 655c 305c  re\1\sv_voice\0\
        0x01f0:  7569 5f6d 6178 636c 6965 6e74 735c 3332  ui_maxclients\32
        0x0200:  5c70 7377 7264 5c30 5c6d 6f64 5c30 0a    \pswrd\0\mod\0.
14:50:42.716292 IP Y1.YY.YY.YY.28965 > XX.XX.XX.XX.80: UDP, length 870
        0x0000:  4500 0382 0000 4000 2f11 27e7 c1c0 3be0  E.....@./.'...;.
        0x0010:  cbaa 5739 7125 0050 036e 1547 ffff ffff  ..W9q%.P.n.G....
        0x0020:  7374 6174 7573 5265 7370 6f6e 7365 0a5c  statusResponse.\
        0x0030:  7368 6f72 7476 6572 7369 6f6e 5c30 2e34  shortversion\0.4
        0x0040:  2d34 325c 7376 5f6d 6178 636c 6965 6e74  -42\sv_maxclient
        0x0050:  735c 3138 5c5f 4164 6d69 6e5c 447a 696e  s\18\_Admin\Dzin
        0x0060:  5c5f 456d 6169 6c5c 6164 6d69 6e40 6261  \_Email\admin@ba
        0x0070:  6c6b 616e 2d77 6172 732e 636f 6d5c 5f4c  lkan-wars.com\_L
        0x0080:  6f63 6174 696f 6e5c 5468 6520 556e 696f  ocation\The.Unio
        0x0090:  6e20 6f66 2053 6f76 6965 7420 536f 6369  n.of.Soviet.Soci
        0x00a0:  616c 6973 7469 6320 5265 7075 626c 6963  alistic.Republic
        0x00b0:  735c 5f57 6562 7369 7465 5c68 7474 703a  s\_Website\http:
        0x00c0:  2f2f 6261 6c6b 616e 2d77 6172 732e 636f  //balkan-wars.co
        0x00d0:  6d5c 6169 775f 7265 6d6f 7465 4b69 636b  m\aiw_remoteKick
        0x00e0:  5c31 5c61 6977 5f73 6563 7572 655c 305c  \1\aiw_secure\0\
        0x00f0:  675f 6761 6d65 7479 7065 5c77 6172 5c67  g_gametype\war\g
        0x0100:  5f68 6172 6463 6f72 655c 305c 6761 6d65  _hardcore\0\game
        0x0110:  6e61 6d65 5c49 5734 5c6d 6170 6e61 6d65  name\IW4\mapname
        0x0120:  5c6d 705f 6272 6563 6f75 7274 5c70 726f  \mp_brecourt\pro
        0x0130:  746f 636f 6c5c 3134 345c 7363 725f 6761  tocol\144\scr_ga
        0x0140:  6d65 5f61 6c6c 6f77 6b69 6c6c 6361 6d5c  me_allowkillcam\
        0x0150:  315c 7363 725f 7465 616d 5f66 6674 7970  1\scr_team_fftyp
        0x0160:  655c 305c 7376 5f61 6c6c 6f77 416e 6f6e  e\0\sv_allowAnon
        0x0170:  796d 6f75 735c 305c 7376 5f61 6c6c 6f77  ymous\0\sv_allow
        0x0180:  436c 6965 6e74 436f 6e73 6f6c 655c 315c  ClientConsole\1\
        0x0190:  7376 5f66 6c6f 6f64 5072 6f74 6563 745c  sv_floodProtect\
        0x01a0:  315c 7376 5f68 6f73 746e 616d 655c 7c46  1\sv_hostname\|F
        0x01b0:  5233 3344 4f4d 7c20 4669 6768 7465 7273  R33DOM|.Fighters
        0x01c0:  2055 4b20 4e6f 5475 6265 2d4e 6f41 6b69  .UK.NoTube-NoAki
        0x01d0:  6d62 6f2d 5444 4d20 3234 2f37 5c73 765f  mbo-TDM.24/7\sv_
        0x01e0:  6d61 7850 696e 675c 3330 305c 7376 5f6d  maxPing\300\sv_m
        0x01f0:  6178 5261 7465 5c31 3530 3030 305c 7376  axRate\150000\sv
        0x0200:  5f6d 696e 5069 6e67 5c30 5c73 765f 7072  _minPing\0\sv_pr
        0x0210:  6976 6174 6543 6c69 656e 7473 5c30 5c73  ivateClients\0\s
        0x0220:  765f 7072 6976 6174 6543 6c69 656e 7473  v_privateClients
        0x0230:  466f 7243 6c69 656e 7473 5c30 0a30 2039  ForClients\0.0.9
        0x0240:  3939 2022 5768 6974 6573 7061 726b 6c65  99."Whitesparkle
        0x0250:  7322 0a30 2038 3920 226d 6174 7269 6361  s".0.89."matrica
        0x0260:  2033 220a 3020 3734 2022 5368 616b 7567  .3".0.74."Shakug
        0x0270:  616e 220a 3020 3536 2022 3336 3048 6561  an".0.56."360Hea
        0x0280:  6453 686f 7422 0a36 3030 2037 3620 2261  dShot".600.76."a
        0x0290:  7665 6c6c 7573 220a 3630 3020 3132 3220  vellus".600.122.
        0x02a0:  2253 696c 7665 7222 0a34 3030 2031 3133  "Silver".400.113
        0x02b0:  2022 4576 616c 6f6e 220a 3131 3030 2037  ."Evalon".1100.7
        0x02c0:  3720 225e 345b 4d5e 3969 575e 345d 4465  7."^4[M^9iW^4]De
        0x02d0:  725e 220a 3130 3020 3937 2022 416e 6472  r^".100.97."Andr
        0x02e0:  6579 2053 756b 6163 6822 0a31 3030 2036  ey.Sukach".100.6
        0x02f0:  3620 2244 7a65 6968 6e6f 3933 220a 3230  6."Dzeihno93".20
        0x0300:  3020 3839 2022 5265 6e22 0a30 2031 3338  0.89."Ren".0.138
        0x0310:  2022 d1d1 d1d0 220a 3230 3020 3334 2022  ."....".200.34."
        0x0320:  7061 7631 220a 3430 3020 3138 3720 224b  pav1".400.187."K
        0x0330:  6172 6c6f 735f 3538 220a 3230 3020 3237  arlos_58".200.27
        0x0340:  3020 226d 4f6e 7374 6572 220a 3730 3020  0."mOnster".700.
        0x0350:  3137 3220 224d 6572 6365 6e61 7279 220a  172."Mercenary".
        0x0360:  3130 3230 2039 3620 226e 696b 6f6c 6122  1020.96."nikola"
        0x0370:  0a33 3030 2031 3234 2022 5349 444f 4922  .300.124."SIDOI"
        0x0380:  0a00    

As far as I know CoD 4 doesn't use port 80 UDP, and I can't see anything
else that would. The box doesn't have anything listening for port 80/udp
(it does run a web server) and never has.

Has anyone seen similar traffic before? I am struggling to figure out
what is causing this traffic, or if its existing traffic being replayed
to try and avoid filters.

Thanks



home help back first fref pref prev next nref lref last post