[flow-tools] w32.sqlexp.worm

McDonald, Dan Dan.McDonald@austinenergy.com
Sat, 25 Jan 2003 15:05:08 -0600


In case anyone needs it, here is the flow-tools nfilter that I've found to
match the worm that hit us...

filter-primitive mssql
  type ip-port
  permit 1434
  default deny

filter-primitive wormsize
   type counter
   permit eq 404
   default deny

filter theworm
   match src-ip-port mssql
   match octets wormsize

that with a flow-print -f 5 gave me the time of the first infection...

Daniel J McDonald, CCIE #2495, CNX
Lan/Wan Integrator
Austin Energy
1.512.322.6739
dan.mcdonald@austinenergy.com