<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Suspicious Packet with MAC address all zeros in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-packet-with-mac-address-all-zeros/m-p/157098#M51560</link>
    <description>&lt;P&gt;I personally think it is a TFTP DDoS, based on this article.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/news/trivial-file-transfer-protocol-used-in-new-ddos-attack/" target="_blank"&gt;https://securityintelligence.com/news/trivial-file-transfer-protocol-used-in-new-ddos-attack/&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 18 May 2017 03:03:16 GMT</pubDate>
    <dc:creator>sum0831</dc:creator>
    <dc:date>2017-05-18T03:03:16Z</dc:date>
    <item>
      <title>Suspicious Packet with MAC address all zeros</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-packet-with-mac-address-all-zeros/m-p/156977#M51532</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I monitor networks for my client, recently I discovered some suspicious outbound traffic from internal to a known malicious host, although the packet was dropped on the PA. the logs I have showing that the packet's source IP as the internet's router sub interfaces IP with MAC address all zeros &amp;amp; destination IP as the malicious host and destination MAC all zeros.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After a chat with one of the network guys, he advised someone might be spoofing an IP from the internal, sicne the setup is internal -&amp;gt;PA-&amp;gt;internet router-&amp;gt;internet. and the packet was dropped before it reached the router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My questions are, what does the MAC address with all zeros tells me? and are there any way of figuring out the "true" source of the traffic? since there could be a compromised host in the network?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 22:54:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-packet-with-mac-address-all-zeros/m-p/156977#M51532</guid>
      <dc:creator>sum0831</dc:creator>
      <dc:date>2017-05-16T22:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious Packet with MAC address all zeros</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-packet-with-mac-address-all-zeros/m-p/157009#M51540</link>
      <description>&lt;P&gt;all-zeroes mac might indeed be a spoofing attack from someone (or something) smart enough to hide the hardware address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the next place you should look is the network switch to see if you can determine the switchport the mac address is known on, you&amp;nbsp; might be able to zero your search&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;on a cisco switch that would be something like&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;show mac address-table address 0000.0000.0000&lt;/PRE&gt;
&lt;P&gt;the output, with a little luck, could tell you the port the mac was seen on:&lt;/P&gt;
&lt;PRE&gt;PANW_CORE#sh mac address-table 
Codes: * - primary entry

  vlan   mac address     type    learn qos            ports
------+----------------+--------+-----+---+--------------------------
*    1  0090.0b22.7d8c   dynamic  Yes   --  Gi4/2
*    3  001b.175d.1310   dynamic  Yes   --  Gi3/7
&lt;/PRE&gt;</description>
      <pubDate>Wed, 17 May 2017 08:20:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-packet-with-mac-address-all-zeros/m-p/157009#M51540</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-05-17T08:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious Packet with MAC address all zeros</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-packet-with-mac-address-all-zeros/m-p/157085#M51559</link>
      <description>&lt;P&gt;we ran a packet capturing and manage to get some logs off the PA, we have identified the MAC address of the outbound traffic was actually from one of the interface of the router to the malicious host. but I still can't identified the internal host that generated this traffic. Please advise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The malicious host inbound traffic were on TFTP some sort of Read request to some pdf documents. and the outbound traffic was UDP with No such file in the data.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 02:39:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-packet-with-mac-address-all-zeros/m-p/157085#M51559</guid>
      <dc:creator>sum0831</dc:creator>
      <dc:date>2017-05-18T02:39:39Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious Packet with MAC address all zeros</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-packet-with-mac-address-all-zeros/m-p/157098#M51560</link>
      <description>&lt;P&gt;I personally think it is a TFTP DDoS, based on this article.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/news/trivial-file-transfer-protocol-used-in-new-ddos-attack/" target="_blank"&gt;https://securityintelligence.com/news/trivial-file-transfer-protocol-used-in-new-ddos-attack/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 03:03:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-packet-with-mac-address-all-zeros/m-p/157098#M51560</guid>
      <dc:creator>sum0831</dc:creator>
      <dc:date>2017-05-18T03:03:16Z</dc:date>
    </item>
  </channel>
</rss>

