• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

How to detect a cyber attack

Scheduled Pinned Locked Moved General pfSense Questions
28 Posts 9 Posters 3.9k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • H
    hugoeyng
    last edited by Aug 29, 2019, 6:21 PM

    PfSense 2.4.4
    Antivirus installed (Clama)

    In the last days I notice my WAN´s are strange. I did not detect a cause.
    I suspect that i am sufferring an cyber attack.
    Is there some "sign" in pfSense that can help me knowing if it is really an attack?

    When I reset "states" everything go okay again during some hours.

    I love pfSense!

    Hugo Eyng
    Datamais Sistemas

    1 Reply Last reply Reply Quote 0
    • K
      KOM
      last edited by Aug 29, 2019, 6:31 PM

      Not enough info. Define 'strange'. And no, there is no magic "YOU'RE UNDER ATTACK!!" alert or anything. Do you have any port forwards that might be external targets?

      H 1 Reply Last reply Aug 29, 2019, 7:36 PM Reply Quote 1
      • H
        hugoeyng @KOM
        last edited by Aug 29, 2019, 7:36 PM

        @KOM said in How to detect a cyber attack:

        Not enough info. Define 'strange'. And no, there is no magic "YOU'RE UNDER ATTACK!!" alert or anything. Do you have any port forwards that might be external targets?

        Strange: Memory Usage up to 80%
        Traffic Very slow
        Sometimes it seems DNS does not work
        When I reset States everything starts working again for some minutes

        Port forwards: yes.

        • Some ports are allowed WTS and are blocked by a rule to non known external IP
        • Some ports are allowed UltraVNC and are open to any external IP, but only when I am exceuting UltraVNC.

        I was not suposed to be a magic "YOU'RE UNDER ATTACK!!". I supose there is some "hint/tip" or evidence as log´s or something like that.

        I love pfSense!

        Hugo Eyng
        Datamais Sistemas

        1 Reply Last reply Reply Quote 0
        • K
          KOM
          last edited by Aug 29, 2019, 7:49 PM

          What does the traffic graph show while this effect is happening? Is your WAN being pounded with a ton of traffic aka a DoS attack?

          What packages are you running? Snort & Suricata can cause problems on your LAN if you aren't careful, for instance.

          On the dashboard, in the System Info widget, what do you have for State table size?

          H 1 Reply Last reply Aug 29, 2019, 8:09 PM Reply Quote 1
          • H
            hugoeyng @KOM
            last edited by Aug 29, 2019, 8:09 PM

            @KOM said in How to detect a cyber attack:

            What does the traffic graph show while this effect is happening? Is your WAN being pounded with a ton of traffic aka a DoS attack?
            What packages are you running? Snort & Suricata can cause problems on your LAN if you aren't careful, for instance.
            On the dashboard, in the System Info widget, what do you have for State table size?

            1. Traffic graph semms normal
            2. 83b642ae-7388-42c3-b5ad-dde3187ba427-image.png
              3)05c77de0-ea2f-4d2c-8255-70056cd4d637-image.png
              d4104420-6701-4f77-a2b1-e28729f115c2-image.png

            I love pfSense!

            Hugo Eyng
            Datamais Sistemas

            1 Reply Last reply Reply Quote 0
            • K
              KOM
              last edited by KOM Aug 30, 2019, 1:57 PM Aug 29, 2019, 8:26 PM

              Hmmm, nothing unusual there. Squid can easily suck up a ton of RAM, and your other problem might be related to your ISP and their network. If you look at Status - Monitoring, do you have any significant packet loss?

              H 1 Reply Last reply Aug 29, 2019, 9:03 PM Reply Quote 1
              • H
                hugoeyng @KOM
                last edited by Aug 29, 2019, 9:03 PM

                @KOM I was not monitoring.
                Now I will use e9ef337f-e32a-4256-a36a-4eb90f120d23-image.png

                And I will wait to see what happens.

                I love pfSense!

                Hugo Eyng
                Datamais Sistemas

                T 1 Reply Last reply Aug 29, 2019, 9:19 PM Reply Quote 0
                • T
                  tim.mcmanus @hugoeyng
                  last edited by Aug 29, 2019, 9:19 PM

                  @hugoeyng said in How to detect a cyber attack:

                  @KOM I was not monitoring.
                  Now I will use e9ef337f-e32a-4256-a36a-4eb90f120d23-image.png

                  And I will wait to see what happens.

                  You may want to use something other than 8.8.8.8. You will get false positives using Google's DNS servers. They will drop your traffic.

                  1 Reply Last reply Reply Quote 1
                  • A
                    akuma1x
                    last edited by Aug 29, 2019, 9:23 PM

                    I believe it's recommended to use the gateway provided by your ISP as the monitor IP, since it's the first router/hop before your traffic hits the actual internet. If that's down, it truly means your connection is DOWN.

                    Jeff

                    1 Reply Last reply Reply Quote 1
                    • D
                      Derelict LAYER 8 Netgate
                      last edited by Aug 29, 2019, 9:29 PM

                      It depends. Sometimes you want to know that the WAN can actually reach the internet, not just the ISP gateway.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      H 1 Reply Last reply Aug 30, 2019, 2:00 PM Reply Quote 1
                      • H
                        hugoeyng @Derelict
                        last edited by Aug 30, 2019, 2:00 PM

                        @Derelict Instead Google DNS or ISP DNS what IP could I use to monitor? Any suggestion?

                        I love pfSense!

                        Hugo Eyng
                        Datamais Sistemas

                        1 Reply Last reply Reply Quote 0
                        • K
                          KOM
                          last edited by Aug 30, 2019, 2:01 PM

                          Perhaps one of your ISPs core routers. Do a traceroute somewhere and see what the second or third hop is.

                          H 1 Reply Last reply Aug 30, 2019, 2:39 PM Reply Quote 1
                          • S
                            stephenw10 Netgate Administrator
                            last edited by Aug 30, 2019, 2:09 PM

                            I've never seen an issue using 8.8.8.8 personally.

                            The fact that you have some SWAP usage shown in that screenshot shows that at some point you exhausted the RAM. That can make things go waaaay slower.
                            Check the Status > Monitoring graphs for memory usage. Does it peak when you see these incidents?

                            Steve

                            R 1 Reply Last reply Aug 30, 2019, 2:12 PM Reply Quote 1
                            • R
                              Rico LAYER 8 Rebel Alliance @stephenw10
                              last edited by Aug 30, 2019, 2:12 PM

                              @stephenw10 said in How to detect a cyber attack:

                              I've never seen an issue using 8.8.8.8 personally.

                              Yeah I like to use 8.8.8.8, 8.8.4.4 and 1.1.1.1 for monitoring too.

                              -Rico

                              H 1 Reply Last reply Aug 30, 2019, 2:41 PM Reply Quote 1
                              • H
                                hugoeyng @KOM
                                last edited by Aug 30, 2019, 2:39 PM

                                @KOM Great!

                                I love pfSense!

                                Hugo Eyng
                                Datamais Sistemas

                                1 Reply Last reply Reply Quote 0
                                • H
                                  hugoeyng @Rico
                                  last edited by Aug 30, 2019, 2:41 PM

                                  @Rico I am not sure but is possible that "You will get false positives using Google's DNS servers." as said @tim-mcmanus.

                                  But I liked @KOM suggestion.

                                  I love pfSense!

                                  Hugo Eyng
                                  Datamais Sistemas

                                  1 Reply Last reply Reply Quote 0
                                  • R
                                    Rico LAYER 8 Rebel Alliance
                                    last edited by Aug 30, 2019, 2:48 PM

                                    I never heard of Google deliberately dropping ICMP traffic to their DNS Servers and personally I never had any issues with it.

                                    WANGW.png
                                    WANGW is using 8.8.8.8 atm.

                                    -Rico

                                    1 Reply Last reply Reply Quote 2
                                    • R
                                      Rico LAYER 8 Rebel Alliance
                                      last edited by Aug 30, 2019, 2:51 PM

                                      Monitoring any ISP router does not really show a reliable route to the Internet.
                                      Your ISP could have any routing/peering issue, even if their (core) router is perfectly reachable from your side.

                                      -Rico

                                      1 Reply Last reply Reply Quote 2
                                      • K
                                        KOM
                                        last edited by Aug 30, 2019, 2:58 PM

                                        It shows you if there is a problem between you and your ISP. Anything past that is out of your control. The whole point of the thing is to be a gateway monitor, not a 5-hops-away monitor. The farther away you monitor, the more likely you will get a false positive of some sort, and I wouldn't want my gateway going down because there is a routing problem many hops away from me.

                                        1 Reply Last reply Reply Quote 0
                                        • Raffi_R
                                          Raffi_
                                          last edited by Aug 30, 2019, 3:04 PM

                                          On the monitor IP topic, I agree with @Rico and @stephenw10. I have not had issue so far with google DNS. In fact I switched to Google DNS because I suddenly had issues with my ISP's (third hop router). After months of working fine, we had power failures in the area which I suspect also caused issues with that route on the ISP's network. My gateway was marked as down when it wasn't. Switched to 8.8.8.8 and it's been good since then. Is it a perfect solution? No. Will this happen to you? Probably not, but using a device IP on a specific route on the ISP's network to me seems like trouble. If that route goes down like in my case, the traffic will get rerouted and still reach where it needs to go on the web. But that can't happen if my gateway is marked as down and monitoring action is enabled. Ideally, I would like to be able to put in multiple monitor IPs, so if one is not responding another one could.

                                          1 Reply Last reply Reply Quote 1
                                          20 out of 28
                                          • First post
                                            20/28
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received