The price is now 6.2 cents by the way. Inflation.
From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf Of Glenn Kelley Sent: Saturday, October 02, 2010 8:16 PM To: WISPA General List Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway IP Spoofing can really hit you hard. Running a datacenter I have received reports from a number of other DC's then when doing the actual investigation I have to tell an engineer @ the other DC that they are wrong. Retaliation is never a good thing - chances are you are hitting the wrong person. Just my 2 cents On Oct 2, 2010, at 7:55 PM, Greg Ihnen wrote: How about the Backtrack toolset. In the early days of the internet (for me) I would see people trying to attack me so I'd use some script kiddie tools to throw attacks back at them. If they weren't patched they'd go down. Often they'd go down. Then again that was a colossal waste of time. It's better to just block them, and once in a while look at your address list and see who's gotten put in the sand box. Greg On Oct 2, 2010, at 7:18 PM, Robert West wrote: Or......! A rule that will route them back to themselves! Now THAT would be hilarious!!! Bob- From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf Of RickG Sent: Saturday, October 02, 2010 12:56 AM To: WISPA General List Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway "But thinking back on it, imagine the "Damn it!" looks on their faces if they DID get in only to find a nothing Mikrotik routerboard!" LOL, it would be funny to have something connected that did nothing. Better yet, just reroute them to fbi.gov <http://fbi.gov/> ! On Fri, Oct 1, 2010 at 10:22 PM, Robert West <robert.w...@just-micro.com> wrote: I've been migrating everything to a central location. Not done yet but boy, have had a mess the past 3 weeks with the reconfiguring and moving of "stuff". As well as one major gateway out of the "solar" status to real grid power. Finally! Was interesting to watch the log, though. I blocked every IP as it popped up then they switched from FTP to SSH. Once SSH was blocked, they went the hell away. But thinking back on it, imagine the "Damn it!" looks on their faces if they DID get in only to find a nothing Mikrotik routerboard! HA! From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf Of Glenn Kelley Sent: Friday, October 01, 2010 10:00 PM To: WISPA General List Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway Bob, If memory serves me correct - you do not have a central network - is that right? instead your just using multiple pops via cable modems? If that is the case - it might be a bit more difficult - on the other hand - if you have switched to a central network (or have this in some places) than I can give you an easy transparent bridge solution @ no cost (just need one of your old pc's and 2 nics :-) ) Let me know On Oct 1, 2010, at 9:48 PM, Glenn Kelley wrote: why not just block china (and other countries) from access unless it is something opened first from inside the network ? Would make a big difference :-) On Oct 1, 2010, at 9:28 PM, RickG wrote: 61.155.5.247 ____________________________________________________________________________ _________ Glenn Kelley | Principle | HostMedic |www.HostMedic.com <http://www.HostMedic.com/> Email: gl...@hostmedic.com Pplease don't print this e-mail unless you really need to. ---------------------------------------------------------------------------- ---- WISPA Wants You! Join today! http://signup.wispa.org/ ---------------------------------------------------------------------------- ---- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ ____________________________________________________________________________ _________ Glenn Kelley | Principle | HostMedic |www.HostMedic.com <http://www.HostMedic.com/> Email: gl...@hostmedic.com Pplease don't print this e-mail unless you really need to. ---------------------------------------------------------------------------- ---- WISPA Wants You! Join today! http://signup.wispa.org/ ---------------------------------------------------------------------------- ---- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ ---------------------------------------------------------------------------- ---- WISPA Wants You! Join today! http://signup.wispa.org/ ---------------------------------------------------------------------------- ---- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ ---------------------------------------------------------------------------- ---- WISPA Wants You! Join today! http://signup.wispa.org/ ---------------------------------------------------------------------------- ---- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ ____________________________________________________________________________ _________ Glenn Kelley | Principle | HostMedic |www.HostMedic.com Email: gl...@hostmedic.com Pplease don't print this e-mail unless you really need to.
-------------------------------------------------------------------------------- WISPA Wants You! Join today! http://signup.wispa.org/ -------------------------------------------------------------------------------- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/