It could really be caused by any number of things. What services are they running? Are they connected to the internet? What ports do they have open? What ports are supposed to be open?
Hopefully when you built these machines, you noted or you know now what ports are supposed to be open. Take a look at 'netstat -na' and see what ports are actually open. Granted if you did get compromised, these may not show up, so port scan your servers and see if they see any rogue servers.
As far as I know, most of the common DOS agents work on Win2k also. You are going to have to do some serious recon work on these servers. Note the open ports, the running services, server load and where that load is coming from.
If this doesn't point you in the right direction, give us some more details to try and isolate the problem a bit. Have you tried to capture any of the packets to see where they were destined for, seen if there is any other rogue traffic on your net (ie at a relatively quiet time sniff you net and see if there are any servers trying to connect to you or anything inside trying to connect to something out of the ordinary on the outside (ie an IRC server, as is common for DDOS clients.)
The servers were creating major ICMP (hosts?) traffic as reported by our upstream provider. We blocked all outbound ICMP traffic at the router from the affected servers and that solved the problem. But when we look at the router to see dropped packets from the servers, there was none.
The outbound traffic was going to random IP addresses. We are digging into the servers to see if we can find what was causing it.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.