<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is my firewall hacked already ? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/436770#M96302</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194751"&gt;@banny6&lt;/a&gt;&amp;nbsp;As previously said, you are not using supported PanOS version, which is likely probe to bugs and vulnerabilities. Apart from that nginx and syslog-ng are standard process required for the running of the firewall.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 27 Sep 2021 09:04:10 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2021-09-27T09:04:10Z</dc:date>
    <item>
      <title>Is my firewall hacked already ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/436685#M96295</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I have a PA3020 with 7.0.5-h2 PAN-os version.&amp;nbsp; I noticed that it have a lot of DNS traffic sent to strange IP address.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;when I running&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;show system resources command.&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I found&amp;nbsp; strange process nginx and two syslog-ng there.&amp;nbsp; Is it normal, how to get rid of them ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2797 nobody 20 0 53388 5712 3344 S 0.0 0.1 8:19.70 nginx&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;6804 nobody 20 0 107m 12m 6472 S 0.0 0.3 2:11.43 appweb3&lt;BR /&gt;6811 nobody 20 0 104m 10m 6704 S 0.0 0.3 2:06.39 appweb3&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3282 20 0 16156 1308 472 S 0.0 0.0 0:00.00 syslog-ng&lt;BR /&gt;3283 20 0 16556 2988 1716 S 0.0 0.1 0:02.53 syslog-ng&lt;BR /&gt;3861 20 0 12468 4920 3016 S 0.0 0.1 64:36.48 packet_path_pin&lt;BR /&gt;6804 nobody 20 0 107m 12m 6472 S 0.0 0.3 2:11.43 appweb3&lt;BR /&gt;6811 nobody 20 0 104m 10m 6704 S 0.0 0.3 2:06.39 appweb3&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Sep 2021 10:07:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/436685#M96295</guid>
      <dc:creator>banny6</dc:creator>
      <dc:date>2021-09-26T10:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: Is my firewall hacked already ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/436732#M96299</link>
      <description>&lt;P&gt;Hi Banny,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to know your end host is accessing malicious domains, please upgrade your firewall.&lt;/P&gt;&lt;P&gt;As per your firewall info, you are running an old version of PAN-OS. If you upgrade your firewall, the latest version supports DNS&amp;nbsp; malicious domain traffic using EDL or DNS security license.&lt;/P&gt;&lt;P&gt;And now pls use all security profiles and logs verify whether your firewall is hacked or not&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 01:56:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/436732#M96299</guid>
      <dc:creator>Mudhireddy</dc:creator>
      <dc:date>2021-09-27T01:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: Is my firewall hacked already ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/436770#M96302</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194751"&gt;@banny6&lt;/a&gt;&amp;nbsp;As previously said, you are not using supported PanOS version, which is likely probe to bugs and vulnerabilities. Apart from that nginx and syslog-ng are standard process required for the running of the firewall.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 09:04:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/436770#M96302</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2021-09-27T09:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: Is my firewall hacked already ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/436980#M97379</link>
      <description>&lt;P&gt;Ok.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think those are normal after the info I verified in my firewall, and I can see similar outputs, but I am not facing any issue with the firewall and Can you provide more info or complete logs&lt;/P&gt;&lt;P&gt;&amp;gt; show system resources and&lt;/P&gt;&lt;P&gt;&amp;gt; show running resource-monitoring&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="output.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36648i62AF94195E823BEE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="output.png" alt="output.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 17:10:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/436980#M97379</guid>
      <dc:creator>Mudhireddy</dc:creator>
      <dc:date>2021-09-27T17:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: Is my firewall hacked already ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/437027#M97385</link>
      <description>&lt;P&gt;Thanks. Here are the process info.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found PA-3020 box sent DNS traffic to two rogue DNS servers which I didn't configure them at all.&amp;nbsp; the rogue DNS traffic just less than 1M size. in the traffic session, even I clear it. this DNS session will re-connection again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show system resources | match syslog&lt;BR /&gt;1584 20 0 1888 640 528 S 0.0 0.0 1:24.62 syslogd&lt;BR /&gt;3282 20 0 16156 1308 472 S 0.0 0.0 0:00.00 syslog-ng&lt;BR /&gt;3283 20 0 16556 2988 1716 S 0.0 0.1 0:02.59 syslog-ng&lt;/P&gt;&lt;P&gt;&amp;gt; show system resources | match nginx&lt;BR /&gt;2410 20 0 38040 5984 4604 S 0.0 0.2 0:00.03 nginx&lt;BR /&gt;2797 nobody 20 0 53388 5760 3348 S 0.0 0.1 8:42.71 nginx&lt;/P&gt;&lt;P&gt;&amp;gt; show system resources | match app&lt;BR /&gt;1774 0 -20 48836 13m 4052 S 0.0 0.4 82:14.46 masterd_apps&lt;BR /&gt;6800 nobody 20 0 155m 50m 9080 S 0.0 1.3 78:49.51 appweb3&lt;BR /&gt;6804 nobody 20 0 107m 12m 6440 S 0.0 0.3 2:31.24 appweb3&lt;BR /&gt;6811 nobody 20 0 104m 10m 6656 S 0.0 0.3 2:25.38 appweb3&lt;/P&gt;&lt;P&gt;&amp;gt; show system resources | match packet&lt;BR /&gt;3861 20 0 12468 4920 3016 S 0.0 0.1 66:10.54 packet_path_pin&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 21:39:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/437027#M97385</guid>
      <dc:creator>banny6</dc:creator>
      <dc:date>2021-09-27T21:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: Is my firewall hacked already ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/437043#M97386</link>
      <description>&lt;P&gt;There are two DNS netstat UDP session always existed there.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;udp 0 0 192.168.1.250:49978 terror.inconifre:domain ESTABLISHED&lt;BR /&gt;udp 0 0 192.168.1.250:38490 hosted-by.leasew:domain ESTABLISHED&lt;/P&gt;&lt;P&gt;192.168.1.250 is my PA-3020 interface IP address,&amp;nbsp; from web GUI, if reset this DNS session, it will spawn new DNS session automatically.&amp;nbsp; but I never configure that two DNS server.&lt;/P&gt;&lt;P&gt;not sure which process launch this rogue&amp;nbsp; DNS session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 21:37:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-my-firewall-hacked-already/m-p/437043#M97386</guid>
      <dc:creator>banny6</dc:creator>
      <dc:date>2021-09-27T21:37:18Z</dc:date>
    </item>
  </channel>
</rss>

