Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SOPHOS XGS 2100 Zenmap intense portscan - Linksys WRT45G dropbear?

Hi there,

is this a possible valid portscan for the XGS 2100?



I'm wondering about the Linksys WRT56G modified dropbear sshd Port.

Thanks!

Best Regards



This thread was automatically locked due to age.
Parents Reply Children
  • Thanks for your reply and help.

    When I use the command tcpdump -ni any host 10.0.0.1 and port 22, then I get:

    14:42:44.743449 br0, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17581104:17581424, ack 11761, win 1502, length 320
    14:42:44.743450 Port4, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17581104:17581424, ack 11761, win 1502, length 320
    14:42:44.743452 oct0, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17581104:17581424, ack 11761, win 1502, length 320
    14:42:44.743470 br0, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17581424:17581872, ack 11761, win 1502, length 448
    14:42:44.743473 Port4, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17581424:17581872, ack 11761, win 1502, length 448
    14:42:44.743474 oct0, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17581424:17581872, ack 11761, win 1502, length 448
    14:42:44.743492 br0, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17581872:17582320, ack 11761, win 1502, length 448
    14:42:44.743495 Port4, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17581872:17582320, ack 11761, win 1502, length 448
    14:42:44.743495 oct0, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17581872:17582320, ack 11761, win 1502, length 448
    14:42:44.743514 br0, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17582320:17582896, ack 11761, win 1502, length 576
    14:42:44.743516 Port4, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17582320:17582896, ack 11761, win 1502, length 576
    14:42:44.743517 oct0, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17582320:17582896, ack 11761, win 1502, length 576
    14:42:44.743535 br0, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17582896:17583344, ack 11761, win 1502, length 448
    14:42:44.743537 Port4, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17582896:17583344, ack 11761, win 1502, length 448
    14:42:44.743538 oct0, OUT: IP 10.0.0.1.22 > 10.0.0.8.46445: Flags [P.], seq 17582896:17583344, ack 11761, win 1502, length 448

    and muuuuuch of that and fast...

  • Hi   I am able to see br0 in your last capture, Is there any bridge between LAN and WAN in your existing XGS?

    Regards,

    Vishal Ranpariya
    Technical Account Manager | Sophos Technical Support

    Sophos Support Videos | Knowledge Base  |  @SophosSupport | Sign up for SMS Alerts |
    If a post solves your question use the 'This helped me' link.

  • Hi, no there is only at br0 the LAN Ports bridged...

  •    Thanks for the clarification on that part, For SSH scanning part or other services in the scan result if the given steps are not helping to narrow down the situation then I would suggest opening a support case to check it further.

    Regards,

    Vishal Ranpariya
    Technical Account Manager | Sophos Technical Support

    Sophos Support Videos | Knowledge Base  |  @SophosSupport | Sign up for SMS Alerts |
    If a post solves your question use the 'This helped me' link.

  • Okay, I will do it. Thanks so much for your help really.

    I can imagine, that someone manipulate the HW FW. Also I have here two APX 120, one only red light and another without any light - like dead...