Connection Logger

Brian Mitchell is the original author of this fine tool (try brian@saturn.net).

There are 5 fields, each of which is seperated by the '|' character.

You can easily specify alternate filters, so this program could be easily used to detect any sort of connection from 'unusual' hostnames. The filtering syntax is exactly the same as that in the tcpdump package - if you know how to do filters with tcpdump, you know how to do filters with clog!

Another possible use is detecting the so-called "stealth scanners". How a stealth scanner works is it sends a SYN packet (which is what clog logs) and if something is listening on that port, the server sends a SYN/ACK packet. If nothing is listening on the port, the server sends a RST/ACK packet. In the normal course of connection opening, after you get the SYN/ACK packet, you would return a ACK packet, thus completing the 3 way handshake; stealth scanners dont do this, they only do 2/3 steps, once they get a SYN/ACK or a RST/ACK, they know if something is listening on the port or not.

Finally, there is the 'FTP Bounce' attack described by hobbit@avian.org in his whitepaper on the subject. I have included his whitepaper as ftp-bounce.txt in this distribution, I suggest you read it - it is most interesting, and raised some interesting points.


shrdlu AT deaddrop DOT org

Last modified: Sat Oct 30 23:22:01 PDT 2004