<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Suspicious DNS Query - how to find source computer? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/40998#M30133</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Having your DNS server logs forwarded to a centralized location such as a log collector appliance or SIEM, or having full packet captures to an appliance (or both!) are two things that are essential in my mind for being able to effectively research events like these.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are two suggested ways of doing this "on the cheap" (the only cost is hardware and time essentially)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the log collector/SIEM, an open source solution I can recommended is ELSA: &lt;A href="https://code.google.com/p/enterprise-log-search-and-archive/" title="https://code.google.com/p/enterprise-log-search-and-archive/"&gt; enterprise-log-search-and-archive - Enterprise log search and archive (ELSA) is an industrial-strength solution for centralized log management. - Google Project Hosting &lt;/A&gt;&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="color: #000000; font-family: arial, sans-serif; font-size: 13px; background-color: #ffffff;"&gt;ELSA is a centralized syslog framework built on Syslog-NG, MySQL, and Sphinx full-text search. It provides a fully asynchronous web-based query interface that normalizes logs and makes searching billions of them for arbitrary strings as easy as searching the web. It also includes tools for assigning permissions for viewing the logs as well as email based alerts, scheduled queries, and graphing.&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For an open source full packet capture solution, I've read about openfpc: &lt;A class="active_link" href="https://code.google.com/p/openfpc/" title="https://code.google.com/p/openfpc/"&gt; openfpc - Open Full Packet Capture - Google Project Hosting &lt;/A&gt;&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="color: #000000; font-family: arial, sans-serif; font-size: 13px; background-color: #ffffff;"&gt;OpenFPC is a set of scripts that combine to provide a lightweight full-packet network traffic recorder &amp;amp; buffering tool. It's design goal is to allow non-expert users to deploy a distributed network traffic recorder on COTS hardware while integrating into existing alert and log tools.&lt;/SPAN&gt;"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 05 Apr 2013 13:40:54 GMT</pubDate>
    <dc:creator>ericgearhart</dc:creator>
    <dc:date>2013-04-05T13:40:54Z</dc:date>
    <item>
      <title>Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/40996#M30131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Since I upgraded to 5.0.3 from 4.1.10 I started getting such entry in Treat log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Suspicious DNS Query (Backdoor.rshot:app.pou.me) 4009473 spyware medium drop-all-packets 74&lt;/P&gt;&lt;P&gt;Suspicious DNS Query (Downloader.fik:encyklopedia.eduteka.pl) 4008620 spyware medium drop-all-packets 31&lt;/P&gt;&lt;P&gt;Suspicious DNS Query (generic:stor1173.uploaded.net) 4014899 spyware medium drop-all-packets 26&lt;/P&gt;&lt;P&gt;Bot: Torpig Phone Home DNS request 12657 spyware medium drop-all-packets 276&lt;/P&gt;&lt;P&gt;Suspicious DNS Query (generic:www.tns-counter.ru) 4000032 spyware medium drop-all-packets 40&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's pointing to my two DNS servers for my local networks. I'm almost sure that this isnt a problem with this servers because last week was Eastern Christmas and during this time I never got such traffic. When my users back to work its started again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some of user's computers are in the same Zone as this two DNS servers. How in this case catch sources of this traffic? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For other network I will enable strict Tread profile on allow DNS traffic rules, I hope that this will give me information about real sources of this dns requests.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2013 06:59:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/40996#M30131</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-04-05T06:59:36Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/40997#M30132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have a look at the DNS servers' log files if available ? That should direct you to the client IPs requesting such hostnames.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2013 08:30:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/40997#M30132</guid>
      <dc:creator>BCH</dc:creator>
      <dc:date>2013-04-05T08:30:34Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/40998#M30133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Having your DNS server logs forwarded to a centralized location such as a log collector appliance or SIEM, or having full packet captures to an appliance (or both!) are two things that are essential in my mind for being able to effectively research events like these.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are two suggested ways of doing this "on the cheap" (the only cost is hardware and time essentially)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the log collector/SIEM, an open source solution I can recommended is ELSA: &lt;A href="https://code.google.com/p/enterprise-log-search-and-archive/" title="https://code.google.com/p/enterprise-log-search-and-archive/"&gt; enterprise-log-search-and-archive - Enterprise log search and archive (ELSA) is an industrial-strength solution for centralized log management. - Google Project Hosting &lt;/A&gt;&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="color: #000000; font-family: arial, sans-serif; font-size: 13px; background-color: #ffffff;"&gt;ELSA is a centralized syslog framework built on Syslog-NG, MySQL, and Sphinx full-text search. It provides a fully asynchronous web-based query interface that normalizes logs and makes searching billions of them for arbitrary strings as easy as searching the web. It also includes tools for assigning permissions for viewing the logs as well as email based alerts, scheduled queries, and graphing.&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For an open source full packet capture solution, I've read about openfpc: &lt;A class="active_link" href="https://code.google.com/p/openfpc/" title="https://code.google.com/p/openfpc/"&gt; openfpc - Open Full Packet Capture - Google Project Hosting &lt;/A&gt;&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="color: #000000; font-family: arial, sans-serif; font-size: 13px; background-color: #ffffff;"&gt;OpenFPC is a set of scripts that combine to provide a lightweight full-packet network traffic recorder &amp;amp; buffering tool. It's design goal is to allow non-expert users to deploy a distributed network traffic recorder on COTS hardware while integrating into existing alert and log tools.&lt;/SPAN&gt;"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2013 13:40:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/40998#M30133</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-05T13:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/40999#M30134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your sugestion. For first step I will enable logs on my DNS serwers, if this doesnt help I will try to setup SIEM.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2013 14:33:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/40999#M30134</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-04-05T14:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41000#M30135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As for log collection or easier searches, you might want to try Splunk out (www.splunk.com), kinda easy to install and setup, with very straightforward searches (although the free version comes with a daily log limitation of 500MB &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2013 14:37:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41000#M30135</guid>
      <dc:creator>BCH</dc:creator>
      <dc:date>2013-04-05T14:37:52Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41001#M30136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can just enable the DNS signature PCAP for the spyware profile and view the PCAP clicking the PCAP icon in the threat logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S: Illustration performed on OS_5.0.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="6199" alt="DNS PCAP and EXception.PNG" class="jiveImage" height="256" src="https://live.paloaltonetworks.com/legacyfs/online/6199_DNS PCAP and EXception.PNG" style="width: 451px; height: 255.85144566301096px;" width="451" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="6198" alt="DNS KB PCAP2.PNG" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/6198_DNS KB PCAP2.PNG" style="width: 450px; height: 177px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="DNS PCAP-Capture.PNG" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/6205_DNS PCAP-Capture.PNG" style="width: 450px; height: 76px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ameya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2013 22:45:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41001#M30136</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-04-05T22:45:55Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41002#M30137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the Palo Alto only saw the request from the DNS server out to the Internet and alerts on that traffic, wouldn't that still not provide enough info to track down the original client?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you added a mirrored switch port of your LAN side network trwffic to a tap port on the PA, then the original client could be seen. Also if you segregated your DNS server from your clients into two separate VLANs and used the PA to route between them, you'd see the original traffic that way too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Full packet capture / centralized logging is still the overall 'best practice' in my humble opinion &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Apr 2013 18:21:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41002#M30137</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-06T18:21:14Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41003#M30138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are dealing with this issue now and we may not have access to DNS logs and we have a distributed DNS structure with an internal root DNS.&amp;nbsp; The root dns server may only be forwarding a request drom one of our distributed dns servers.&amp;nbsp; What we are looking is creating FQDN based objects for the DNS entries identified by PA and then putting those objects in a rule to block non DNS traffic.&amp;nbsp; This will identify the probable comprimised hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Apr 2013 20:09:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41003#M30138</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2013-04-06T20:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41004#M30139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt;If the Palo Alto only saw the request from the DNS server out to the Internet and alerts on that traffic, wouldn't that still not provide enough info to track down the original client?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;not, because klient and dns server are in the same security zone. That is my problem. Rest of my networks are separated, that one no.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I came up with idea: put on every policy from separated network security profile that will block such traffic. After that if I will have in logs warnings about thats mean that problem is from this one zone with DNS servers on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also preparing for Splunk instalation. That could help me now and in the future.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 12:29:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41004#M30139</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-04-09T12:29:57Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41005#M30140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ran into similar situation with conficker spyware. The option is to enable logging on the DNS server to find out the original client. That is usually not possible due to high volume of logs. The other option is to SPAN/mirror your DNS server port and configure TAP on PAN. I have this configuration running in my network and it provides you with the real client ip address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 13:19:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41005#M30140</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2013-04-09T13:19:21Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41006#M30141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What about creating a new VSYS on your PA device and attach 2 interfaces to it which you configure as VWIRE and then plug that between your DNS and the rest of the network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh and in this VSYS configure it only for alterting to not disturb the flows (that is unless you wish to block the queries with the help of the PA).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Apr 2013 07:23:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41006#M30141</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-04-10T07:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41007#M30142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mikand: I know that VWIRE is better (easier) than SPAN port on switch.&lt;/P&gt;&lt;P&gt;At the moment I have a lot of things to do and I haven't time for it.&lt;/P&gt;&lt;P&gt;I have PA200 and I'm not sure that I can create second VSYS, and I'm sure that I ran out of free Security zones (I have used 10 at the moment).&lt;/P&gt;&lt;P&gt;But if you can help me on priv (I 'm alsomst newbe in PAN) we can do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment I isolated problem. This suspicius reguest comes from my WiFi networks, so its mean that from private users computers. Thats good for me &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Apr 2013 12:36:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41007#M30142</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-04-10T12:36:16Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41008#M30143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You'll have to enable dns debug file on your dns server to get the level of detail you need to find the sources of the dns requests.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's how; (Warning: Microsoft recommends only keeping dns debug captures enabled temporarily)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Login to server&lt;/P&gt;&lt;P&gt;2. Open dnsmgmt - (Administrative tools -&amp;gt; DNS)&lt;/P&gt;&lt;P&gt;3. Right Click on your server object and select properties&lt;/P&gt;&lt;P&gt;4. Select Debug Logging&lt;/P&gt;&lt;P&gt;5. Put check mark on;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packet Direction [Outgoing and Incoming]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packet Contents [ Queries/Transfer]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer Protocol [UDP/TCP]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packet type [Request/Response]&lt;/P&gt;&lt;P&gt;6. Choose where you want the debug file created and make sure you have enough space to hold the files.&lt;/P&gt;&lt;P&gt;7. Select OK&lt;/P&gt;&lt;P&gt;8. Done&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now just go into the threat log of Palo Alto, find the dns name ie. google then search [Ctrl+F] for that URL in the dns debug file . Make sure to only search for the URL without the suffix at the end. (example: google.com - only look for google as the dns debug format substitutes dots for a format like "(6)" .)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is the quick and dirty way to find it. If you have hundreds of entries from multiple sources, you will need to create a script. I wrote a VB script for this very purpose to find Conficker infected hosts on my network. It's 100% accurate. If anyone wants a copy, reply back to me and I can post the code.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jan 2014 21:17:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41008#M30143</guid>
      <dc:creator>lpham</dc:creator>
      <dc:date>2014-01-09T21:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41009#M30144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to say I found this thread really beneficial.&amp;nbsp; We only allow our AD servers to do outbound DNS queries and it never occurred to me that spyware signatures would check DNS traffic - enabled it and cleared the DNS server caches and sure enough had a ping for a nice piece of webwebgo crapware &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 16:02:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41009#M30144</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2014-06-19T16:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41010#M30145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;use the dns sinkhole feature in 6.0 this is what its meant for. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user makes dns request , dns server performs look up, palo alto picks this up via dns signature then returns sink hole ip . User then tries to connect to the sinkhole ip and its will get recorded in the traffic logs as such. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-6220"&gt;How to Configure DNS Sinkholing on PAN-OS 6.0&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jun 2014 11:29:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41010#M30145</guid>
      <dc:creator>jkim2</dc:creator>
      <dc:date>2014-06-24T11:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41011#M30146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the below document for the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-7783"&gt;DNS Sinkhole Process with Internal DNS Server&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sarath&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Oct 2014 15:36:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41011#M30146</guid>
      <dc:creator>sbabu</dc:creator>
      <dc:date>2014-10-24T15:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - how to find source computer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41012#M30147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have configured DNS sinkole, but it does not sinkhole these DNS requests (torpig):&lt;/P&gt;&lt;P&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-1283" style="text-align: right !important; padding: 3px 3px 3px 0;"&gt;Name&lt;/LABEL&gt;&lt;SPAN style="font-size: 11px; line-height: 1.5em;"&gt;Bot: Torpig Phone Home DNS request&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="x-form-display-field" style="padding: 4px 0 0; font-size: 11px;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;P class="x-form-item" style="margin: 0 0 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-1284" style="text-align: right !important; padding: 3px 3px 3px 0;"&gt;ID&lt;/LABEL&gt;&lt;SPAN style="font-size: 11px; line-height: 1.5em;"&gt;12657&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="x-form-display-field" style="padding: 4px 0 0; font-size: 11px;"&gt;&lt;P&gt;I believe sinkhole threat IDs can be between 4000000 and 4999999 on paloalto. &lt;/P&gt;&lt;P&gt;I don't know why torpig is not included.&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jan 2015 00:08:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-how-to-find-source-computer/m-p/41012#M30147</guid>
      <dc:creator>MMCiobanu</dc:creator>
      <dc:date>2015-01-07T00:08:27Z</dc:date>
    </item>
  </channel>
</rss>

