TheBattleship Posted April 18, 2008 Share Posted April 18, 2008 Hi Guys, I run a Windows 2003 Server (no flaming please – it’s part of the job!), which hosts various websites and forums. Recently, I decided to install Cain and Able on it just to see what unencrypted traffic was being passed through (ie bad coding). Unfortunately, this is what I discovered [next post]. I’m not overly concerned, because although I am running a MySQL server, the “root” account isn’t actually called “root”. How can I stop this “attack” from happening and using up bandwidth and clock cycles? Cheers, Matt Quote Link to comment Share on other sites More sharing options...
TheBattleship Posted April 18, 2008 Author Share Posted April 18, 2008 The image: http://senduit.com/b716ff (Forum software doesn't let you post links on your first post.) Quote Link to comment Share on other sites More sharing options...
VaKo Posted April 18, 2008 Share Posted April 18, 2008 Set a firewall to drop all traffic from that IP both in and out. Quote Link to comment Share on other sites More sharing options...
TheBattleship Posted April 18, 2008 Author Share Posted April 18, 2008 Done. By the looks of it, he's still trying(!) I also identified the ISP and sent an abuse email to them. Quote Link to comment Share on other sites More sharing options...
Razor512 Posted April 19, 2008 Share Posted April 19, 2008 i always wondered, do they ever check those abuse e-mails? Quote Link to comment Share on other sites More sharing options...
K1u Posted April 19, 2008 Share Posted April 19, 2008 Done. By the looks of it, he's still trying(!) I also identified the ISP and sent an abuse email to them. His ISP wont do crap. Just follow VaKo's advice. Quote Link to comment Share on other sites More sharing options...
digip Posted April 19, 2008 Share Posted April 19, 2008 A lot of these are from bot networks and random searches for vulnerable networks, so this is only a bandaid against one person. If there is a hole in your software, patch it, or you are just setting yourself up for more attacks. Check this article: http://isc.sans.org/diary.html?storyid=4294 Most of these attacks are automated, so the user has very little to do other than click a button to start the process rolling. Quote Link to comment Share on other sites More sharing options...
TheBattleship Posted April 19, 2008 Author Share Posted April 19, 2008 After various tests, I configured IPSec to drop packets to the port that MySQL was running on, if they came from the internet NIC (as the application that required MySQL didn't need to be accessed from outside the network. Thanks for everyone's help! Matt Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.