<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is Threat ID 40033 &amp;quot;DNS ANY Queries Brute Force DOS Attack&amp;quot; in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536752#M1900</link>
    <description>&lt;P&gt;According to the KB, &lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmpCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmpCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;40033 is triggered if a session has same source and same destination but triggers our child signature, 34842, &lt;STRONG&gt;250 times in 30 seconds&lt;/STRONG&gt;. (not 500 times per 60 seconds).&lt;/P&gt;</description>
    <pubDate>Tue, 28 Mar 2023 05:24:22 GMT</pubDate>
    <dc:creator>ymiyashita</dc:creator>
    <dc:date>2023-03-28T05:24:22Z</dc:date>
    <item>
      <title>What is Threat ID 40033 "DNS ANY Queries Brute Force DOS Attack"</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/535523#M1887</link>
      <description>&lt;P&gt;Hi All&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to know about&amp;nbsp;Threat ID 40033 "DNS ANY Queries Brute Force DOS Attack". I found the firewall drop traffic and hit the threat id-40033, but we try to packet capture with this traffic for DNS query for same source and same destination is not reach 500 times per 60 seconds.&amp;nbsp; Why Palo drop the query packet? and what's traffic that hit list the threat id-40033?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Threat Prevention" id="Threat_Prevention"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 08:08:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/535523#M1887</guid>
      <dc:creator>Jitaphon</dc:creator>
      <dc:date>2023-03-23T08:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: What is Threat ID 40033 "DNS ANY Queries Brute Force DOS Attack"</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/535582#M1888</link>
      <description>&lt;P&gt;DNS ANY request means if client asks DNS server "give me all the data".&lt;/P&gt;
&lt;P&gt;Now assume you host DNS server and receive DNS ANY request with forged source IP.&lt;/P&gt;
&lt;P&gt;Incoming packet to you is small but outgoing packet you send out is big.&lt;/P&gt;
&lt;P&gt;This can be used in DDoS attack if attacker sends DNS ANY requests with spoofed source IP of the victim.&lt;/P&gt;
&lt;P&gt;DNS servers reply to victim and effectively attacker has achieved amplification attack.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can test how DNS ANY request looks like from your computer command line:&lt;/P&gt;
&lt;P&gt;nslookup -type=any &lt;A href="http://www.ee" target="_blank"&gt;www.ee&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 16:38:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/535582#M1888</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-23T16:38:37Z</dc:date>
    </item>
    <item>
      <title>Re: What is Threat ID 40033 "DNS ANY Queries Brute Force DOS Attack"</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536480#M1895</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks, I want to known, what traffic can be the cause of hit the Threat-ID?&lt;/P&gt;</description>
      <pubDate>Sun, 26 Mar 2023 14:32:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536480#M1895</guid>
      <dc:creator>Jitaphon</dc:creator>
      <dc:date>2023-03-26T14:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: What is Threat ID 40033 "DNS ANY Queries Brute Force DOS Attack"</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536481#M1896</link>
      <description>&lt;P&gt;DNS ANY request generates threat id&amp;nbsp;34842 (DNS ANY Request).&lt;/P&gt;
&lt;P&gt;Multiple&amp;nbsp;DNS ANY requests in a row generate 40033 (DNS ANY Queries Brute Force DOS Attack).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Mar 2023 16:57:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536481#M1896</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-26T16:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: What is Threat ID 40033 "DNS ANY Queries Brute Force DOS Attack"</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536555#M1898</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;How can I check for this matter?&lt;BR /&gt;&lt;/SPAN&gt;"&lt;STRONG&gt;Now assume you host DNS server and receive DNS ANY request with forged source IP."&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;"Incoming packet to you is small but outgoing packet you send out is big."&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 06:12:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536555#M1898</guid>
      <dc:creator>Jitaphon</dc:creator>
      <dc:date>2023-03-27T06:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: What is Threat ID 40033 "DNS ANY Queries Brute Force DOS Attack"</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536589#M1899</link>
      <description>&lt;P&gt;&lt;SPAN&gt;DNS ANY is logged under threat id 34842 so you can check firewall threat log using filter below..&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;( threatid eq 34842 ) &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 12:20:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536589#M1899</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-27T12:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: What is Threat ID 40033 "DNS ANY Queries Brute Force DOS Attack"</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536752#M1900</link>
      <description>&lt;P&gt;According to the KB, &lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmpCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmpCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;40033 is triggered if a session has same source and same destination but triggers our child signature, 34842, &lt;STRONG&gt;250 times in 30 seconds&lt;/STRONG&gt;. (not 500 times per 60 seconds).&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 05:24:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536752#M1900</guid>
      <dc:creator>ymiyashita</dc:creator>
      <dc:date>2023-03-28T05:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: What is Threat ID 40033 "DNS ANY Queries Brute Force DOS Attack"</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536754#M1901</link>
      <description>&lt;P&gt;Every time computer tries to resolve DNS request it will send out request to every DNS suffix it has.&lt;/P&gt;
&lt;P&gt;In addition depending on operating system it might send those requests to all its DNS servers simultaneously .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Add count column and you see that single line can actually be multiple events.&lt;/P&gt;
&lt;P&gt;Below is small demo I ran through firewall.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1679982205266.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49058iFD8D97DC9F44689C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1679982205266.png" alt="Raido_Rattameister_0-1679982205266.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 05:45:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/what-is-threat-id-40033-quot-dns-any-queries-brute-force-dos/m-p/536754#M1901</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-28T05:45:05Z</dc:date>
    </item>
  </channel>
</rss>

