"sscan" Scanning ToolThursday, January 28, 1999
Recently a new scanning tool named "sscan" was announced on various public mailing lists. This tool is a derivative of the "mscan" tool that was widely used against a large number of sites in the second half of 1998. For more information about mscan, please read our earlier Incident Note IN-98.02:
The sscan tool performs probes against victim hosts to identify services which may potentially be vulnerable to exploitation. Though sscan itself does not attempt to exploit vulnerabilities, it can be configured to automatically execute scripts of commands that can be maliciously crafted to exploit vulnerabilities. Thus, it is possible for an unpredictable set of attacks to be mounted against a victim site in conjunction with the sscan probes.
The documentation distributed with sscan includes an example set of scripted commands illustrating how a self-replicating attack might be crafted using well known vulnerabilities detected by sscan. We encourage you to familiarize yourself with the actions sscan performs and to insure that your site is not vulnerable to attack.
The current version of sscan has been written specifically to execute on a UNIX platform. Because the tool crafts packets with custom attributes, privileged access to the source host is required to run sscan. We encourage you to be mindful of the potential for intruder control of the source host when responding to an incident involving sscan probes.
To determine whether the sscan tool is possibly being used against your site, look for the following activity:
- Initial probes to selected services to determine the availability
of the target host. TCP ACK packets are sent to the target host
with the source and destination ports set as follows:
- source and destination TCP port 23 (telnet)
- source and destination TCP port 25 (smtp)
- source and destination TCP port 110 (pop3)
- source and destination TCP port 143 (imap)
- source and destination TCP port 80 (www)
- If any of the above probes receives a response, further probes are made
to the target host in an attempt to identify potential vulnerabilities.
Connection probes to the following TCP ports are user optional and
may or may not appear in additional sscan activity. The TCP ports are
listed in the order in which they currently would be probed by sscan.
- 80 (www)
- 23 (telnet), 143 (imap), 110 (pop3) [all three, or none, are probed]
- 111 (sunrpc)
- 6000 (x11)
- 79 (finger)
- 53 (domain)
- 31337 (unassigned by IANA)
- 2766 (Solaris listen/nlps_server)
As currently configured, the sscan tool will not attempt to probe a host further if no response is received from these initial probes.
Connection probes to the following TCP ports are always attempted and are not user optional. The TCP ports are listed in the order in which they are probed by sscan.
- 139 (netbios-ssn)
- 25 (smtp)
- 21 (ftp)
- 22 (ssh)
- 1114 (Linux mSQL)
- 1 (tcpmux)
Ports responding to the probes in this section are considered by sscan to be "open" ports.
- TCP connection probe to port 23 (telnet) to obtain the login banner
- Probes attempting to identify system and network architecture
similar to those discussed in CERT Incident Note IN-98.04:
In this case, five packets are sent to the target host on the first TCP port identified as being "open" in the previous scanning (section 2). The five packets have the following characteristics:
- Packet #1 - SYN ACK packet from source TCP port 1
- Packet #2 - FIN packet from source TCP port 2
- Packet #3 - FIN ACK packet from source TCP port 3
- Packet #4 - SYN FIN packet from source TCP port 4
- Packet #5 - PUSH packet from source TCP port 5
- qpopper - see
- imapd - see
- SMTP EXPN command
- Solaris listen/nlps_server (port 2766)
- Linux mSQL (port 1114)
- BIND - see http://www.cert.org/advisories/CA-98.05.bind_problems.html
- Various CGI-BIN vulnerabilities - see
- phf - also see http://www.cert.org/advisories/CA-96.06.cgi_example_code.html
- handler - also see ftp://ftp.cert.org/pub/cert_bulletins/VB-97.07.sgi
- Count.cgi - also see http://www.cert.org/advisories/CA-97.24.Count_cgi.html
- test-cgi - also see http://www.cert.org/advisories/CA-97.07.nph-test-cgi_script.html
- php.cgi - also see ftp://ftp.auscert.org.au/pub/auscert/ESB/ESB-97.047
- webdist.cgi - also see ftp://ftp.cert.org/pub/cert_bulletins/VB-97.07.sgi
- perl.exe (Windows platforms)
- wwwboard.pl (Windows platforms)
If any machines in your network use any of the above services, we encourage you to make sure that all patches are up to date and your machines are properly secured.
We also urge you to filter all traffic at your firewall except that which you explicitly decide to allow. Please read our packet filtering tech tip for more information:
Sites using UNIX systems may also wish to consult the following documents:
CERT/CC wishes to thank AusCERT for their assistance in developing this Incident Note.
Copyright 1999 Carnegie Mellon University.