Página 1 de 3 123 ÚltimoÚltimo
+ Responder ao Tópico



  1. Se sua rede usa mikrotik e vc não sabe se ela tem backdoor é facil identificar, ping qualquer endereço inexistente ex: wwwwww.ffffxsxswqwqx.com.br, se a resposta for 218.93.250.18, seu mk tem um backdoor. Aconselho comprar uma licença pois logo logo tu vai ter surpresa pois ja esta rodando na net um login e senha padrão pra entrar em qualquer um que tenha este sintoma.


    Best Regards..

  2. Boa tarde o meu esta dando essa resposta e ai?Clique na imagem para uma versão maior

Nome:	         mik.png
Visualizações:	78
Tamanho: 	128,3 KB
ID:      	54511



  3. pinga pelo new terminal.

  4. o meu ficou assim mas estou usando o firewall com as seguintes regras que peguei num forum que naum me lembro

    add chain=virus comment="Bloqueio de virus"
    add chain=forward connection-state=invalid action=drop comment="Drop invalid connections" disabled=no
    add chain=forward connection-state=established action=accept comment="Established Connections" disabled=no
    add chain=forward connection-state=related action=accept comment="Related connections" disabled=no
    add chain=forward action=jump jump-target=virus comment="!!! Check for well-known viruses !!!" disabled=no
    add chain=forward protocol=udp action=accept comment="UDP" disabled=no
    add chain=forward protocol=icmp limit=50/5,2 action=accept comment="Allow limited Pings" disabled=no
    add chain=forward protocol=icmp action=drop comment="Drop excess pings" disabled=no
    add chain=input connection-state=invalid action=drop comment="Drop invalid connections" disabled=no
    add chain=input tcp-flags=!syn connection-state=established action=accept comment="Accept established connections" disabled=no
    add chain=input connection-state=related action=accept comment="Accept related connections" disabled=no
    add chain=input action=jump jump-target=virus comment="!!! Check for well-known viruses !!!" disabled=no
    add chain=input protocol=udp action=accept comment="UDP" disabled=no
    add chain=input protocol=icmp limit=50/5,2 action=accept comment="Allow limited pings" disabled=no
    add chain=input protocol=icmp action=drop comment="Drop excess pings" disabled=no
    add chain=input dst-port=22 protocol=tcp action=accept comment="SSH for demo purposes" disabled=no
    add chain=input dst-port=23 protocol=tcp action=accept comment="Telnet for demo purposes" disabled=no
    add chain=input dst-port=80 protocol=tcp action=accept comment="http for demo purposes" disabled=no
    add chain=input dst-port=3987 protocol=tcp action=accept comment="winbox for demo purposes" disabled=no
    add chain=input action=accept log=yes comment="Log and drop everything else" disabled=no
    add chain=virus dst-port=135-139 protocol=tcp action=drop comment="Drop Blaster Worm" disabled=no
    add chain=virus dst-port=135-139 protocol=udp action=drop comment="Drop Messenger Worm" disabled=no
    add chain=virus dst-port=445 protocol=tcp action=drop comment="Drop Blaster Worm" disabled=no
    add chain=virus dst-port=445 protocol=udp action=drop comment="Drop Blaster Worm" disabled=no
    add chain=virus dst-port=593 protocol=tcp action=drop comment="________" disabled=no
    add chain=virus dst-port=1024-1030 protocol=tcp action=drop comment="________" disabled=no
    add chain=virus dst-port=1080 protocol=tcp action=drop comment="Drop MyDoom" disabled=no
    add chain=virus dst-port=1214 protocol=tcp action=drop comment="________" disabled=no
    add chain=virus dst-port=1363 protocol=tcp action=drop comment="ndm requester" disabled=no
    add chain=virus dst-port=1364 protocol=tcp action=drop comment="ndm server" disabled=no
    add chain=virus dst-port=1368 protocol=tcp action=drop comment="screen cast" disabled=no
    add chain=virus dst-port=1373 protocol=tcp action=drop comment="hromgrafx" disabled=no
    add chain=virus dst-port=1377 protocol=tcp action=drop comment="cichlid" disabled=no
    add chain=virus dst-port=1433-1434 protocol=tcp action=drop comment="Worm" disabled=no
    add chain=virus dst-port=2745 protocol=tcp action=drop comment="Bagle Virus" disabled=no
    add chain=virus dst-port=2283 protocol=tcp action=drop comment="Drop Dumaru.Y" disabled=no
    add chain=virus dst-port=2535 protocol=tcp action=drop comment="Drop Beagle" disabled=no
    add chain=virus dst-port=2745 protocol=tcp action=drop comment="Drop Beagle.C-K" disabled=no
    add chain=virus dst-port=3410 protocol=tcp action=drop comment="Drop Backdoor OptixPro" disabled=no
    add chain=virus dst-port=4444 protocol=tcp action=drop comment="Worm" disabled=no
    add chain=virus dst-port=4444 protocol=udp action=drop comment="Worm" disabled=no
    add chain=virus dst-port=5554 protocol=tcp action=drop comment="Drop Sasser" disabled=no
    add chain=virus dst-port=8866 protocol=tcp action=drop comment="Drop Beagle.B" disabled=no
    add chain=virus dst-port=9898 protocol=tcp action=drop comment="Drop Dabber.A-B" disabled=no
    add chain=virus dst-port=10000 protocol=tcp action=drop comment="Drop Dumaru.Y" disabled=no
    add chain=virus dst-port=10080 protocol=tcp action=drop comment="Drop MyDoom.B" disabled=no
    add chain=virus dst-port=12345 protocol=tcp action=drop comment="Drop NetBus" disabled=no
    add chain=virus dst-port=17300 protocol=tcp action=drop comment="Drop Kuang2" disabled=no
    dd chain=virus dst-port=27374 protocol=tcp action=drop comment="Drop SubSeven" disabled=no
    add chain=virus dst-port=65506 protocol=tcp action=drop comment="Drop PhatBot, Agobot, Gaobot" disabled=no
    Miniaturas de Anexos Miniaturas de Anexos Clique na imagem para uma versão maior

Nome:	         ping.jpg
Visualizações:	52
Tamanho: 	88,3 KB
ID:      	54519  



  5. A tua licença é comprada ou crackeada?

    Citação Postado originalmente por lbsilva Ver Post
    o meu ficou assim mas estou usando o firewall com as seguintes regras que peguei num forum que naum me lembro

    add chain=virus comment="Bloqueio de virus"
    add chain=forward connection-state=invalid action=drop comment="Drop invalid connections" disabled=no
    add chain=forward connection-state=established action=accept comment="Established Connections" disabled=no
    add chain=forward connection-state=related action=accept comment="Related connections" disabled=no
    add chain=forward action=jump jump-target=virus comment="!!! Check for well-known viruses !!!" disabled=no
    add chain=forward protocol=udp action=accept comment="UDP" disabled=no
    add chain=forward protocol=icmp limit=50/5,2 action=accept comment="Allow limited Pings" disabled=no
    add chain=forward protocol=icmp action=drop comment="Drop excess pings" disabled=no
    add chain=input connection-state=invalid action=drop comment="Drop invalid connections" disabled=no
    add chain=input tcp-flags=!syn connection-state=established action=accept comment="Accept established connections" disabled=no
    add chain=input connection-state=related action=accept comment="Accept related connections" disabled=no
    add chain=input action=jump jump-target=virus comment="!!! Check for well-known viruses !!!" disabled=no
    add chain=input protocol=udp action=accept comment="UDP" disabled=no
    add chain=input protocol=icmp limit=50/5,2 action=accept comment="Allow limited pings" disabled=no
    add chain=input protocol=icmp action=drop comment="Drop excess pings" disabled=no
    add chain=input dst-port=22 protocol=tcp action=accept comment="SSH for demo purposes" disabled=no
    add chain=input dst-port=23 protocol=tcp action=accept comment="Telnet for demo purposes" disabled=no
    add chain=input dst-port=80 protocol=tcp action=accept comment="http for demo purposes" disabled=no
    add chain=input dst-port=3987 protocol=tcp action=accept comment="winbox for demo purposes" disabled=no
    add chain=input action=accept log=yes comment="Log and drop everything else" disabled=no
    add chain=virus dst-port=135-139 protocol=tcp action=drop comment="Drop Blaster Worm" disabled=no
    add chain=virus dst-port=135-139 protocol=udp action=drop comment="Drop Messenger Worm" disabled=no
    add chain=virus dst-port=445 protocol=tcp action=drop comment="Drop Blaster Worm" disabled=no
    add chain=virus dst-port=445 protocol=udp action=drop comment="Drop Blaster Worm" disabled=no
    add chain=virus dst-port=593 protocol=tcp action=drop comment="________" disabled=no
    add chain=virus dst-port=1024-1030 protocol=tcp action=drop comment="________" disabled=no
    add chain=virus dst-port=1080 protocol=tcp action=drop comment="Drop MyDoom" disabled=no
    add chain=virus dst-port=1214 protocol=tcp action=drop comment="________" disabled=no
    add chain=virus dst-port=1363 protocol=tcp action=drop comment="ndm requester" disabled=no
    add chain=virus dst-port=1364 protocol=tcp action=drop comment="ndm server" disabled=no
    add chain=virus dst-port=1368 protocol=tcp action=drop comment="screen cast" disabled=no
    add chain=virus dst-port=1373 protocol=tcp action=drop comment="hromgrafx" disabled=no
    add chain=virus dst-port=1377 protocol=tcp action=drop comment="cichlid" disabled=no
    add chain=virus dst-port=1433-1434 protocol=tcp action=drop comment="Worm" disabled=no
    add chain=virus dst-port=2745 protocol=tcp action=drop comment="Bagle Virus" disabled=no
    add chain=virus dst-port=2283 protocol=tcp action=drop comment="Drop Dumaru.Y" disabled=no
    add chain=virus dst-port=2535 protocol=tcp action=drop comment="Drop Beagle" disabled=no
    add chain=virus dst-port=2745 protocol=tcp action=drop comment="Drop Beagle.C-K" disabled=no
    add chain=virus dst-port=3410 protocol=tcp action=drop comment="Drop Backdoor OptixPro" disabled=no
    add chain=virus dst-port=4444 protocol=tcp action=drop comment="Worm" disabled=no
    add chain=virus dst-port=4444 protocol=udp action=drop comment="Worm" disabled=no
    add chain=virus dst-port=5554 protocol=tcp action=drop comment="Drop Sasser" disabled=no
    add chain=virus dst-port=8866 protocol=tcp action=drop comment="Drop Beagle.B" disabled=no
    add chain=virus dst-port=9898 protocol=tcp action=drop comment="Drop Dabber.A-B" disabled=no
    add chain=virus dst-port=10000 protocol=tcp action=drop comment="Drop Dumaru.Y" disabled=no
    add chain=virus dst-port=10080 protocol=tcp action=drop comment="Drop MyDoom.B" disabled=no
    add chain=virus dst-port=12345 protocol=tcp action=drop comment="Drop NetBus" disabled=no
    add chain=virus dst-port=17300 protocol=tcp action=drop comment="Drop Kuang2" disabled=no
    dd chain=virus dst-port=27374 protocol=tcp action=drop comment="Drop SubSeven" disabled=no
    add chain=virus dst-port=65506 protocol=tcp action=drop comment="Drop PhatBot, Agobot, Gaobot" disabled=no






Tópicos Similares

  1. Como saber se minha rede está sofrendo ataque?
    Por Arthuzitow no fórum Servidores de Rede
    Respostas: 4
    Último Post: 14-01-2014, 22:21
  2. Minha rede esta maluca
    Por vandersonlanza no fórum Redes
    Respostas: 8
    Último Post: 25-07-2012, 09:58
  3. Respostas: 12
    Último Post: 21-06-2007, 23:05
  4. Iptables.Porque está repassando para minha rede interna?
    Por gustavorr no fórum Servidores de Rede
    Respostas: 4
    Último Post: 11-08-2005, 15:53
  5. Respostas: 4
    Último Post: 04-01-2005, 09:45

Visite: BR-Linux ·  VivaOLinux ·  Dicas-L