<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Fragroute Evasion Attack - how to find source process/application? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33461#M24536</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last days one of my computer started generating strange&amp;nbsp; traffic that is blocked by Thread Prevention (ID35111)&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2014-06-17_212432.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/13981_2014-06-17_212432.png" style="height: 369px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;I have access to this computer, but how to find and remove this program that is genrating such traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Jun 2014 19:28:41 GMT</pubDate>
    <dc:creator>_slv_</dc:creator>
    <dc:date>2014-06-17T19:28:41Z</dc:date>
    <item>
      <title>Fragroute Evasion Attack - how to find source process/application?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33461#M24536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last days one of my computer started generating strange&amp;nbsp; traffic that is blocked by Thread Prevention (ID35111)&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2014-06-17_212432.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/13981_2014-06-17_212432.png" style="height: 369px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;I have access to this computer, but how to find and remove this program that is genrating such traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2014 19:28:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33461#M24536</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-06-17T19:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: Fragroute Evasion Attack - how to find source process/application?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33462#M24537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Slawek,&lt;/P&gt;&lt;P&gt;You might start by looking at the netstat output for the workstation with the source port 65409&lt;/P&gt;&lt;P&gt;This article will help for a Windows system - &lt;A href="http://www.techrepublic.com/blog/the-enterprise-cloud/see-what-process-is-using-a-tcp-port-in-windows-server-2008/" title="http://www.techrepublic.com/blog/the-enterprise-cloud/see-what-process-is-using-a-tcp-port-in-windows-server-2008/"&gt;See what process is using a TCP port in Windows Server 2008 - TechRepublic&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The SysInternals tools from Microsoft can also help - &lt;A href="http://technet.microsoft.com/en-us/sysinternals/bb545021.aspx" title="http://technet.microsoft.com/en-us/sysinternals/bb545021.aspx"&gt;Windows Sysinternals: Documentation, downloads and additional resources&lt;/A&gt;&lt;/P&gt;&lt;P&gt;One issue that may arise is that modern malware tends to hide itself from the built in tools that could be used to identify it.&lt;/P&gt;&lt;P&gt;May your efforts be successful.&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2014 20:40:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33462#M24537</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2014-06-18T20:40:26Z</dc:date>
    </item>
    <item>
      <title>Re: Fragroute Evasion Attack - how to find source process/application?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33463#M24538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Today I did execption in volnurability profile with pcpap option set.&lt;/P&gt;&lt;P&gt;In Thread log I see:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2014-06-24_212148.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/14092_2014-06-24_212148.png" style="height: 281px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;In Monitor&amp;gt;Packe Capture &amp;gt; Captured files there isn't such file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to save this information in .pcap format file?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I use this information for sending it for further analysis by other vendors?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jun 2014 19:28:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33463#M24538</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-06-24T19:28:47Z</dc:date>
    </item>
    <item>
      <title>Re: Fragroute Evasion Attack - how to find source process/application?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33464#M24539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi slv,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To save the pcap you should use the 'Export' button provided:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="14117" alt="Screen Shot 2014-06-25 at 09.11.29.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/14117_Screen Shot 2014-06-25 at 09.11.29.png" style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;In Monitor&amp;gt;Packet Capture &amp;gt; Captured files you will only find PCAP files which you have grabbed using the filters on that same page or via CLI using the 'debug dataplane packet-diag' command.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Kind regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;-Kim.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jun 2014 07:14:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33464#M24539</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2014-06-25T07:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: Fragroute Evasion Attack - how to find source process/application?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33465#M24540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kim&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" lang="en"&gt;&lt;SPAN class="hps"&gt;oops&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;I&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;guess&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;I was&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;blind! &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" lang="en"&gt;&lt;SPAN class="hps"&gt;Thx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" lang="en"&gt;&lt;SPAN class="hps"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" lang="en"&gt;&lt;SPAN class="hps"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" lang="en"&gt;&lt;SPAN class="hps"&gt;Slawek&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jun 2014 09:48:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33465#M24540</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-06-25T09:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: Fragroute Evasion Attack - how to find source process/application?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33466#M24541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FYI&lt;/P&gt;&lt;P&gt;This traffic was generated by &lt;A href="http://www.ammyy.com/en/"&gt;AmmyAdmin &lt;/A&gt;&lt;/P&gt;&lt;P&gt;Unfortunetelly PAN doesnt detect this traffic as should be. AmmyADmin is well known for PAN OS aplication, but not properly detected on 6.0.2.&lt;/P&gt;&lt;P&gt;Case pending for update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jul 2014 10:26:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fragroute-evasion-attack-how-to-find-source-process-application/m-p/33466#M24541</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-07-01T10:26:08Z</dc:date>
    </item>
  </channel>
</rss>

