[Snort-sigs] SID 233
warchild at ...288...
Fri Mar 22 20:13:03 EST 2002
alert tcp $EXTERNAL_NET any -> $HOME_NET 27665 (msg:"DDOS
Trin00\:Attacker to Master default startup password";flags: A+;
classtype:attempted-dos; sid:233; rev:1;)
The default password ("betaalmostdone") for the trin00 master daemon
was detected coming into the default port for the trin00 DDoS suite.
Chances are good that the trin00 master daemon is running on your
machine. This means that someone has nearly complete control of your
machine, and is most likely commanding hordes of client machines in a
Distributed Denial of Service (DDoS) attack against one or more victim
Trinoo was the first DDoS tool to make serious headlines. The first
step is to create a master daemon. The master daemon is used to
control the army of trin00 clients. To give the attacker a sense of
security, the master daemon requires a password before commands may be
executed. The default password for the most recent release is
As part of a large scale attack against a machine or a network, an
attacker will comprimise large numbers of machines which will form the
army that the trin00 master daemon will command. The master daemon
typically instructs the clients to send mass-quantities of packets to
a set of victim hosts. If the traffic is sufficient, the victim
machines will become resource deprived.
Ease of Attack:
Medium. Use of this tool requires a comprimised system from which to
to run (unless you choose to just run it on your own machine). Once a
machine has been comprimsed,
Rare. The authentication for the master daemon is fairly simple.
This, in addition to the fact that communication on a high port like
this is not very common, makes this rule fairly tight.
Fairly common. Since one of the ideas behind the password was to
prevent "owned" machines from being "re-owned", a common practice was
to change the default password.
Disconnect your machine(s) from the network immediately. Attempt to
determine if your machine was being used as part of a trin00 network.
This may be difficult, given that the system has likely been
comprimised and had a root kit installed.
Warchild <warchild at ...288...>
More information about the Snort-sigs