Ed said:
Is there a particular piece of software that I can get that will let me know
how many times hackers of scanned my ports, etc.? Thanks.
Ed Cregger
I have an ADSL modem connected to a home router, and then my computer is
connected to the router. The scanning is detectable by seeing the WAN
light flashing, with no corresponding LAN light flashing. The activity
varies by day of week and time of day. It varies with IP address, as
my ADSL modem gets an address from a pool of DHCP addresses. I find some
address ranges see more scanning than others. In some cases, I drop the
connection right after I connect, if I see too much flashing of the LED
on the WAN side.
The scanning rate is low, so that the router won't detect a "Syn flood".
The activity is slowed down, so as not to trigger protection like that.
I've toyed with the idea of setting up a box, to fit between the
ADSL modem and the router, to see exactly what they're looking for.
I'm just too lazy to waste time on the experiment.
My router has a "stealth" rating. At least as far as the "Shields Up!"
test link on this page. All that means, is the scanner on grc.com, was not
able to get a response from the 1024 lowest port numbers, which are the "official"
port numbers. The grc scanner actually results in "syn flood" being noted
in the router log, which doesn't happen for the flashing LED stuff I see.
Which means the testing isn't very thorough (because the router is throwing
away the probes from grc.com , rather than processing them).
http://www.grc.com/default.htm
So, no, there is no place for software here. The scanning would only
be observable, between the ADSL modem and the router. If I was connected
directly to the modem, then things would be different (and more
dangerous).
My comment is mainly focused on the idea of running an open FTP server.
What are the odds, that an easily available FTPD daemon, is kept up to date
with respect to the latest exploits ? The people who exploit FTP servers
are very methodical, and I expect the whole process is automated (i.e. a kit).
So there isn't an actual human, trying commands and inspecting stuff. Having
read some of the accounts of stuff like this, is why I wouldn't dream of
running a DMZ, or of using servers like FTPD or HTTPD on a computer
connected to the Internet. That is what cheap hosting is for
Paul