Java should be a no brainer.  I think you're right about the tunnel vision.
Happens to many companies.  No one there with the guts to rock the boat.

 

 

 

 

 

From: [email protected] [mailto:[email protected]] On
Behalf Of Leon D. Zetekoff
Sent: Saturday, October 02, 2010 3:58 PM
To: [email protected]
Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway

 

I asked them about a Java client a long time ago and they nixed it.. Said
there was a Windoze client and it could run under Wine. But I was looking at
other platforms. The biggest problem with Mikrotik is their tunnelvision and
unwillingness to look outside of the box IMHO

Leon

On 10/2/2010 3:04 PM, Greg Ihnen wrote: 

Or Java would be nice. But really anything that is cross platform would be
good. Then I wouldn't have to run Parallels or Fusion all day. 

 

Greg

On Oct 2, 2010, at 12:27 PM, Josh Luthman wrote:





It doesn't answer anything.  You can't configure anything.  It screws up
what you have set.  Hate it.  I would like to see an html copy of winbox,
but that's a dream.

On Oct 2, 2010 12:33 PM, "Robert West" <[email protected]> wrote:
> Ah.. I always use Winbox. Tried Webbox a few times when I "had to" but
> wasn't comfortable with it at all.
> 
> 
> 
> 
> 
> 
> 
> From: [email protected] [mailto:[email protected]] On
> Behalf Of Josh Luthman
> Sent: Saturday, October 02, 2010 11:18 AM
> To: WISPA General List
> Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway
> 
> 
> 
> The MT webbox causes cancer it is so terrible.
> 
> On Oct 2, 2010 9:08 AM, "Greg Ihnen" <[email protected]> wrote:
>> That script should be the MT default when one checks the "protect router"
> check box in the web UI.
>> 
>> Greg
>> 
>> On Oct 2, 2010, at 8:33 AM, Robert West wrote:
>> 
>>> Checked the logs this morning and guess who was back at it.... Was
trying
> to do a brute force attack from yet another IP but that script from Butch
> swatted him like a fly. Worked like a charm!
>>> 
>>> Thanks to both you and Butch, he be gone.
>>> 
>>> Bob-
>>> 
>>> From: [email protected] [mailto:[email protected]] On
> Behalf Of Josh Luthman
>>> Sent: Friday, October 01, 2010 10:38 PM
>>> To: WISPA General List
>>> Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway
>>> 
>>> Compliments of Butch Evans
>>> 
>>> /ip firewal filt
>>> add action=accept chain=forward comment="drop ssh brute forcers"
> disabled=\
>>> no dst-port=22 protocol=tcp src-address-list=ssh_blacklist
>>> add action=add-src-to-address-list address-list=ssh_blacklist \
>>> address-list-timeout=1w3d chain=forward comment="" connection-state=new
\
>>> disabled=no dst-port=22 protocol=tcp src-address-list=ssh_stage3
>>> add action=add-src-to-address-list address-list=ssh_stage3 \
>>> address-list-timeout=1m chain=forward comment="" connection-state=new \
>>> disabled=no dst-port=22 protocol=tcp src-address-list=ssh_stage2
>>> add action=add-src-to-address-list address-list=ssh_stage2 \
>>> address-list-timeout=1m chain=forward comment="" connection-state=new \
>>> disabled=no dst-port=22 protocol=tcp src-address-list=ssh_stage1
>>> add action=add-src-to-address-list address-list=ssh_stage1 \
>>> address-list-timeout=1m chain=forward comment="" connection-state=new \
>>> disabled=no dst-port=22 protocol=tcp src-address-list=!heavysshservers
>>> 
>>> Josh Luthman
>>> Office: 937-552-2340
>>> Direct: 937-552-2343
>>> 1100 Wayne St
>>> Suite 1337
>>> Troy, OH 45373
>>> 
>>> 
>>> On Fri, Oct 1, 2010 at 10:28 PM, Robert West
<[email protected]>
> wrote:
>>> Then we'll just send the pigeons over to poop on them.
>>> 
>>> Easy.
>>> 
>>> 
>>> 
>>> From: [email protected] [mailto:[email protected]] On
> Behalf Of RickG
>>> Sent: Friday, October 01, 2010 9:29 PM
>>> To: Tom Sharples; WISPA General List
>>> Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway
>>> 
>>> I like it but what if the ip is being masqueraded?
>>> 
>>> On Fri, Oct 1, 2010 at 7:00 PM, Tom Sharples <[email protected]>
> wrote:
>>> I've often wondered, is it legal for the receipient of this sort of
> thing, to retailiate with e.g. ping or curl storms?
>>> 
>>> Tom S.
>>> 
>>> 
>>> ----- Original Message -----
>>> From: Robert West
>>> To: 'WISPA General List'
>>> Sent: Friday, October 01, 2010 2:57 PM
>>> Subject: [WISPA] Brute Force Attack on Mikrotik Gateway
>>> 
>>> Just had to deal with a brute force attack on a MT router acting as a
> gateway. 
>>> 
>>> Came from these two IP addresses..
>>> 
>>> 59.42.10.38
>>> 
>>> 61.155.5.247
>>> 
>>> Looked them up, they turn out to be pretty common for this sort of
thing.
> Added a firewall rule to drop them and they are no longer filling my log. 
>>> 
>>> Some may want to do the same for these jokers.
>>> 
>>> Robert West
>>> Just Micro Digital Services Inc.
>>> 740-335-7020
>>> 
>>> <image001.gif>
>>> 
>>> 
>>>

 

  _____  

No virus found in this message.
Checked by AVG - www.avg.com
Version: 10.0.1120 / Virus Database: 422/3172 - Release Date: 10/02/10

  _____  

No virus found in this message.
Checked by AVG - www.avg.com
Version: 10.0.1120 / Virus Database: 422/3172 - Release Date: 10/02/10


--------------------------------------------------------------------------------
WISPA Wants You! Join today!
http://signup.wispa.org/
--------------------------------------------------------------------------------
 
WISPA Wireless List: [email protected]

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to