سلام ، من امروز این ابیوز رو دریافت کردم ، پورت udp 1900 رو بلافاصله در روتر بستم ، سرور کاربر هم ساسپند شد ، پاسخ دیتاسنتر هم داده شده .
من فقط میخوام بدونم ، الان کاربر من دقیقا چه کار کرده ؟
کد:Dear Sir or Madam, the Simple Service Discovery Protocol (SSDP) is a network protocol for advertisement and discovery of network services and presence information. SSDP is the basis of the discovery protocol of Universal Plug and Play (UPnP). SSDP usually uses port 1900/udp. In the past months, systems responding to SSDP requests from the Internet have been increasingly abused for participating in DDoS reflection/amplification attacks. The Shadowserver 'Open SSDP Scanning Project' identifies systems responding to SSDP requests from the Internet which can be abused for DDoS reflection/amplification attacks attacks if no further countermeasures have been implemented. Shadowserver provides CERT-Bund with the test results for IP addresses hosted in Germany for notifying the owners of the affected systems. Futher information on the tests run by Shadowserver is available at [2]. Please find below a list of affected systems hosted on your network. The timestamp (timezone UTC) indicates when the system was tested and responded to SSDP requests from the Internet. We would like to ask you to check this issue and take appropriate steps to secure the SSDP services on the affected systems or notify your customers accordingly. If you have recently solved the issue but received this notification again, please note the timestamp included below. You should not receive any further notifications with timestamps after the issue has been solved. References: [1] Wikipedia: Simple Service Discovery Protocol <http://de.wikipedia.org/wiki/Simple_Service_Discovery_Protocol> [2] Shadowserver: Open SSDP Scanning Project <https://ssdpscan.shadowserver.org/> [3] Arbor Networks: Zunahme von DDoS-Angriffen mittels SSDP <http://www.arbornetworks.com/news-and-events/press-releases/ recent-press-releases/5283-arbor-networks-atlas-data-shows- reflection-ddos-attacks-continue-to-be-significant-in-q3-2014> [4] Sucuri: Quick Analysis of a DDoS Attack Using SSDP <http://blog.sucuri.net/2014/09/quick-analysis-of-a-ddos-attack- using-ssdp.html> [5] US-CERT: UDP-based Amplification Attacks <https://www.us-cert.gov/ncas/alerts/TA14-017A> This message is digitally signed using PGP. Details on the signature key used are available on our website at: <https://www.cert-bund.de/reports-sig> Please note: This is an automatically generated message. Replying to the sender address is not possible. In case of questions, please contact <certbund@bsi.bund.de>. - ----------------------------------------------------------------------- Affected systems on your network: Format: ASN | IP address | Timestamp (UTC) | SSDP server xxx | xx..xx.xx.xx | 2016-02-03 09:55:18 | Azureus/5.7.0.0 UPnP/1.0 Azureus/5.7.0.0 Kind regards Team CERT-Bund Bundesamt für Sicherheit in der Informationstechnik (BSI) Federal Office for Information Security Referat C21 - CERT-Bund Godesberger Allee 185-189, D-53175 Bonn, Germany





 
			
			 
  
 
 ابیوز ssdp در هتزنر
 ابیوز ssdp در هتزنر
				 
					
					
					
						 پاسخ با نقل قول
  پاسخ با نقل قول