on 22-10-2019 12:40
Introduction
If a device behind your public IP address is sending spam, then potentially there are two outcomes that can happen.
The problem is:
What they can't do is hide their traffic though.
This post looks at a way of identifying devices hosting spambots by sniffing network traffic. using the free packet sniffing tool Wireshark and a Windows 10 computer. When I was looking at this technique, I wanted to be able to use what was already in the home with minimal to no outlay on additional hardware.
How you end up on an SBL
It's important to understand how you end up on an SBL.
When you send email normally this is the normal path:
This is a slimmed down version of what happens, but sums up the critical parts of the relay.
Normally stage 2 is protected by some means of authentication while stage 3 can't be.
Spambots attempt to go straight to step 3 - delivering the mail directly from your IP address to a domains inbound server over port 25. This traffic CANNOT be sent to any other port, and under normal circumstances SHOULD not be seen coming from a residential address.
So why doesn't Virgin Media block port 25
While most outbound traffic uses ports 587 and 465 encrypted, some email providers are still living in the dark ages for example if one looks at PlusNet's email settings pages they currently have Port 587 (recommended) or 25 unencrypted for outgoing mail
https://www.plus.net/help/email-guides/how-to-set-up-plusnet-email/
Other providers still use port 25 unencrypted, and while Virgin Media's recommended settings no longer use the legacy servers on port 25, there are still people who use old (pre 2010) settings.
All these people would be adversely affected by such a change, although all users should check to see that they are all using the latest settings for their email provider IMHO.
Detecting Spambot traffic
Even if the user is using port 25 to send mail. It is still possible to detect spambot traffic on the network.
Thus if we sniff for network traffic on port 25 we should be able to find the culprit device.
The testing plan.
The above enables us to test wifi enabled devices. However if we still do not see traffic then it may be necessary to test ethernet connected devices by connecting the PC to the router via wireless and then setting up a network bridge, allowing us to connect ethernet only devices to router THROUGH the PC's ethernet port.
I should stress that the idea behind the process, is that before continuing - we MUST eliminate the PC to begin with. THEN move on to test other devices via the PC. It's not a good idea to short circuit the testing plan.
Before you begin you should also enable telnet in order to test you can see the port 25 traffic when you have set up Wireshark while not absolutely necessary, it is all to easy to monitor the wrong network adapter, testing using telnet can give us confidence that everything is working properly.
Advice on installing Telnet can be found here:
https://www.technipages.com/windows-10-enable-telnet
Stage 1 - Install Wireshark
Wireshark can be downloaded from here:
When installing you'll be asked to install NpCap and WinUSBcap - the former is used for any integrated wifi or ethernet devices, whilst the latter is used if you have things like USB wifi adapters.
Needless to say.
Stage 2 - Test for packets on the PC
Stage 3 - turn on Wifi Hostpot and identify hotspot interface.
Windows 10 supports a wireless hotspot feature which allows you to connect up to 8 wireless devices to your PC and it will work in a similar way to you current NAT router. While this means that devices you connect will be double NAT'ed, for the purposes of outgoing connections this will not be an issue.
Note that the above can be adapted for Ethernet devices. In such circumstances we could connect the PC to the internet via Wifi and then bridge the ethernet and wifi connections:
https://www.windowscentral.com/how-set-and-manage-network-bridge-connection-windows-10
We would then connect any ethernet only devices to the PC and it would actually get a DHCP address from your router and connect to the internet via the bridge. This would enable us to sniff the ethernet connection to look for signs of spam activity. Please read the warning about the device running the bridge losing internet connectivity and how to fix this.
Findings so far.
Currently we've found a PC transmitting spam that otherwise shows no signs of malware infection. We've also found a modified Amazon Firestick doing the same.
It should be stressed that what we see is signs of the malware connecting to different mail servers and trying to send messages. There are also other signs in the traffic as well, but I don't want to go into that on a public Forum.
Finally
Be aware that if you are on the CSS or receive a letter and you do nothing then you are at risk.
If you have a spambot on your network, you may have other malware that could capture passwords or other data.
If you need any help please start a thread either here in Security or the Email section and we'll try and help further.
I'm a Very Insightful Person, I'm here to share knowledge, I don't work for Virgin Media. Learn more
Have I helped? Click Mark as Helpful Answer or use Kudos to say thanks