The price is now 6.2 cents by the way.  Inflation.

 

 

 

From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On
Behalf Of Glenn Kelley
Sent: Saturday, October 02, 2010 8:16 PM
To: WISPA General List
Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway

 

IP Spoofing can really hit you hard.

Running a datacenter I have received reports from a number of other DC's

 

then when doing the actual investigation I have to tell an engineer @ the
other DC that they are wrong.

 

Retaliation is never a good thing - chances are you are hitting the wrong
person.

 

Just my 2 cents 

 

 

On Oct 2, 2010, at 7:55 PM, Greg Ihnen wrote:





How about the Backtrack toolset.

 

In the early days of the internet (for me) I would see people trying to
attack me so I'd use some script kiddie tools to throw attacks back at them.
If they weren't patched they'd go down. Often they'd go down.

 

Then again that was a colossal waste of time. It's better to just block
them, and once in a while look at your address list and see who's gotten put
in the sand box.

 

Greg

 

On Oct 2, 2010, at 7:18 PM, Robert West wrote:





Or......!  A rule that will route them back to themselves!  Now THAT would
be hilarious!!!

 

Bob-

 

From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On
Behalf Of RickG
Sent: Saturday, October 02, 2010 12:56 AM
To: WISPA General List
Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway

 

"But thinking back on  it, imagine the "Damn it!" looks on their faces if
they DID get in only to find a nothing Mikrotik routerboard!"

 

LOL, it would be funny to have something connected that did nothing. Better
yet, just reroute them to fbi.gov <http://fbi.gov/> !

On Fri, Oct 1, 2010 at 10:22 PM, Robert West <robert.w...@just-micro.com>
wrote:

I've been migrating everything to a central location.  Not done yet but boy,
have had a mess the past 3 weeks with the reconfiguring and moving of
"stuff".  As well as one major gateway out of the "solar" status to real
grid power.  Finally!

 

Was interesting to watch the log, though.  I blocked every IP as it popped
up then they switched from FTP to SSH.  Once SSH was blocked, they went the
hell away.

 

But thinking back on  it, imagine the "Damn it!" looks on their faces if
they DID get in only to find a nothing Mikrotik routerboard!  HA!

 

 

 

From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On
Behalf Of Glenn Kelley
Sent: Friday, October 01, 2010 10:00 PM
To: WISPA General List
Subject: Re: [WISPA] Brute Force Attack on Mikrotik Gateway

 

Bob, 

 

If memory serves me correct - you do not have a central network - is that
right?

instead your just using multiple pops via cable modems? 

 

If that is the case - it might be a bit more difficult - on the other hand -
if you have switched to a central network (or have this in some places) 

than I can give you an easy transparent bridge solution @ no cost (just need
one of your old pc's and 2 nics :-)  ) 

 

 

Let me know

 

 

On Oct 1, 2010, at 9:48 PM, Glenn Kelley wrote:

 

 

why not just block china (and other countries) from access unless it is
something opened first from inside the network ?

 

Would make a big difference 

 

:-)

 

 

 

On Oct 1, 2010, at 9:28 PM, RickG wrote:

 

61.155.5.247

 

____________________________________________________________________________
_________

Glenn Kelley | Principle | HostMedic |www.HostMedic.com
<http://www.HostMedic.com/>  

  Email: gl...@hostmedic.com

Pplease don't print this e-mail unless you really need to.

 



----------------------------------------------------------------------------
----
WISPA Wants You! Join today!
http://signup.wispa.org/
----------------------------------------------------------------------------
----

WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

 

____________________________________________________________________________
_________

Glenn Kelley | Principle | HostMedic |www.HostMedic.com
<http://www.HostMedic.com/>  

  Email: gl...@hostmedic.com

Pplease don't print this e-mail unless you really need to.

 




----------------------------------------------------------------------------
----
WISPA Wants You! Join today!
http://signup.wispa.org/
----------------------------------------------------------------------------
----

WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

 



----------------------------------------------------------------------------
----
WISPA Wants You! Join today!
http://signup.wispa.org/
----------------------------------------------------------------------------
----

WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

 



----------------------------------------------------------------------------
----
WISPA Wants You! Join today!
http://signup.wispa.org/
----------------------------------------------------------------------------
----

WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

 

____________________________________________________________________________
_________

Glenn Kelley | Principle | HostMedic |www.HostMedic.com 

  Email: gl...@hostmedic.com

Pplease don't print this e-mail unless you really need to.

 


--------------------------------------------------------------------------------
WISPA Wants You! Join today!
http://signup.wispa.org/
--------------------------------------------------------------------------------
 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to