Re: [uruk] uruk Under heavy attack |
[ Thread Index |
Date Index
| More lists.tuxfamily.org/uruk Archives
]
- To: uruk@xxxxxxxxxxxxxxxxxxx
- Subject: Re: [uruk] uruk Under heavy attack
- From: Ali Abdul Ghani <blade.vp2020@xxxxxxxxx>
- Date: Fri, 13 May 2016 10:26:51 -0700
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-transfer-encoding; bh=ZLvb6yNMBnDL1cpfksAui1yQ3dhmXaLsraQtdnqsrsw=; b=txpdY78MsfqruHhTTjgOzbIDaspbns1tNTRKVqXkTfD+9ac3vHGv4tNDt1hwZgrWBa RmTnP7g+QPp4QlLICxo3WuZoVqk3La9XfzygFB8d4NZTzY4XS/1nOE3SGOQdzbqa2kU0 YptrUvjAKoEuosLRC6/QpVxG5ws5uuxRzWAVWSWX34chaZgj2YFFSnfnePv9fd/giDRU OmfxB/1tyNgJLLCx86sOavryPv7IcAXMUY/90AMxK+1lQNIwrb1JxQXTZOq6pM7K9bLI J37gfk8REolDrvPNGOkFuqLw4ZPtNVKK3B8xvH3DCchQ85FgG5LzPMrLplduZqaW/dUj 2RwQ==
Slept peacefully
its end
I found a simple solution
rosa se it, it Will surprise you
iptables -I INPUT 1 -p tcp --tcp-flags SYN,ACK SYN,ACK -m state
--state NEW -j REJECT --reject-with tcp-reset
iptables -I INPUT 2 -p tcp ! --syn -m state --state NEW -j LOG
--log-prefix "FIREWALL: New not syn:"
iptables -I INPUT 3 -p tcp ! --syn -m state --state NEW -j DROP
iptables -A OUTPUT -j ACCEPT
iptables -A INPUT -i lo -j ACCEPT
# permit answers on already established connections
# and permit new connections related to established ones (eg active-ftp)
# output is not mentioned here because we allow it above
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
# allow open ports for ssh(22),dns(53),www(80),smb(135:139)
iptables -A INPUT -p tcp -m multiport --dport 22,53,80,135:139 -j ACCEPT
iptables -A INPUT -p udp -m multiport --dporp 53,135:139 -j ACCEPT
iptables -A INPUT -p icmp --icmp-type 8,11 -j ACCEPT
# Log everything else: What's Windows latest exploitable vulnerability
# It will be a new non-requisted input,
# maybe from your neighbour trojan
iptables -A INPUT -j LOG --log-prefix "FIREWALL:INPUT"
# set a default policy: everything not accepted > /dev/null
iptables -P INPUT DROP
iptables -P FORWARD DROP
iptables -P OUTPUT DROP
saiy farewell For this kind of attack
And a lot of other types
have fun and be free
ali miracle
2016-05-13 8:40 جرينتش-07:00, hayderctee <cteehayder@xxxxxxxxx>:
> We all with you
>
> On 13 ماي, 2016 م 06:25, rosa wrote:
>> hi all
>> the web site Under heavy attack
>>
>> I Succeeded in stopping the attack
>> But I think the next will be more stronger
>>
>> please help me
>> We must stand together
>> I neede your hands
>> rosa
>>
>>
>
>
>
>
--
Emacs is the ground. We run around and act silly on top of it, and
when we die, may our remnants grace its ongoing incrementation.