IP Spoofing can really hit you hard. Running a datacenter I have received reports from a number of other DC's
then when doing the actual investigation I have to tell an engineer @ the other DC that they are wrong. Retaliation is never a good thing - chances are you are hitting the wrong person. Just my 2 cents On Oct 2, 2010, at 7:55 PM, Greg Ihnen wrote: > How about the Backtrack toolset. > > In the early days of the internet (for me) I would see people trying to > attack me so I'd use some script kiddie tools to throw attacks back at them. > If they weren't patched they'd go down. Often they'd go down. > > Then again that was a colossal waste of time. It's better to just block them, > and once in a while look at your address list and see who's gotten put in the > sand box. > > Greg > > On Oct 2, 2010, at 7:18 PM, Robert West wrote: > >> Or…………..! A rule that will route them back to themselves! Now THAT would >> be hilarious!!! >> >> Bob- >> >> From: [email protected] [mailto:[email protected]] On >> Behalf Of RickG >> Sent: Saturday, October 02, 2010 12:56 AM >> To: WISPA General List >> Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway >> >> "But thinking back on it, imagine the “Damn it!” looks on their faces if >> they DID get in only to find a nothing Mikrotik routerboard!" >> >> LOL, it would be funny to have something connected that did nothing. Better >> yet, just reroute them to fbi.gov! >> >> On Fri, Oct 1, 2010 at 10:22 PM, Robert West <[email protected]> >> wrote: >> I’ve been migrating everything to a central location. Not done yet but boy, >> have had a mess the past 3 weeks with the reconfiguring and moving of >> “stuff”. As well as one major gateway out of the “solar” status to real >> grid power. Finally! >> >> Was interesting to watch the log, though. I blocked every IP as it popped >> up then they switched from FTP to SSH. Once SSH was blocked, they went the >> hell away. >> >> But thinking back on it, imagine the “Damn it!” looks on their faces if >> they DID get in only to find a nothing Mikrotik routerboard! HA! >> >> >> >> From: [email protected] [mailto:[email protected]] On >> Behalf Of Glenn Kelley >> Sent: Friday, October 01, 2010 10:00 PM >> To: WISPA General List >> Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway >> >> Bob, >> >> If memory serves me correct - you do not have a central network - is that >> right? >> instead your just using multiple pops via cable modems? >> >> If that is the case - it might be a bit more difficult - on the other hand - >> if you have switched to a central network (or have this in some places) >> than I can give you an easy transparent bridge solution @ no cost (just need >> one of your old pc's and 2 nics :-) ) >> >> >> Let me know >> >> >> On Oct 1, 2010, at 9:48 PM, Glenn Kelley wrote: >> >> >> >> why not just block china (and other countries) from access unless it is >> something opened first from inside the network ? >> >> Would make a big difference >> >> :-) >> >> >> >> On Oct 1, 2010, at 9:28 PM, RickG wrote: >> >> >> 61.155.5.247 >> >> _____________________________________________________________________________________ >> Glenn Kelley | Principle | HostMedic |www.HostMedic.com >> Email: [email protected] >> Pplease don't print this e-mail unless you really need to. >> >> >> >> -------------------------------------------------------------------------------- >> WISPA Wants You! Join today! >> http://signup.wispa.org/ >> -------------------------------------------------------------------------------- >> >> WISPA Wireless List: [email protected] >> >> Subscribe/Unsubscribe: >> http://lists.wispa.org/mailman/listinfo/wireless >> >> Archives: http://lists.wispa.org/pipermail/wireless/ >> >> _____________________________________________________________________________________ >> Glenn Kelley | Principle | HostMedic |www.HostMedic.com >> Email: [email protected] >> Pplease don't print this e-mail unless you really need to. >> >> >> >> >> -------------------------------------------------------------------------------- >> WISPA Wants You! Join today! >> http://signup.wispa.org/ >> -------------------------------------------------------------------------------- >> >> WISPA Wireless List: [email protected] >> >> Subscribe/Unsubscribe: >> http://lists.wispa.org/mailman/listinfo/wireless >> >> Archives: http://lists.wispa.org/pipermail/wireless/ >> >> >> >> -------------------------------------------------------------------------------- >> WISPA Wants You! Join today! >> http://signup.wispa.org/ >> -------------------------------------------------------------------------------- >> >> WISPA Wireless List: [email protected] >> >> Subscribe/Unsubscribe: >> http://lists.wispa.org/mailman/listinfo/wireless >> >> Archives: http://lists.wispa.org/pipermail/wireless/ > > > > -------------------------------------------------------------------------------- > WISPA Wants You! Join today! > http://signup.wispa.org/ > -------------------------------------------------------------------------------- > > WISPA Wireless List: [email protected] > > Subscribe/Unsubscribe: > http://lists.wispa.org/mailman/listinfo/wireless > > Archives: http://lists.wispa.org/pipermail/wireless/ _____________________________________________________________________________________ Glenn Kelley | Principle | HostMedic |www.HostMedic.com Email: [email protected] Pplease don't print this e-mail unless you really need to.
-------------------------------------------------------------------------------- WISPA Wants You! Join today! http://signup.wispa.org/ -------------------------------------------------------------------------------- WISPA Wireless List: [email protected] Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
