Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

BLACKICE SERVER and Auto-Blocking

Posted on 2003-11-09
4
Medium Priority
?
315 Views
Last Modified: 2010-04-11
Hi,
The Blackice server has an Auto-Block feature.
The auto-block, block only some types of known attacks.

We edit the .ini files and we add new entries to configuration, but, we need to make this entries with Auto-Block feature.

Is it possible to include some other attack types in Auto-Block feature?

Thanks for any help.
0
Comment
Question by:ipsystems
  • 3
4 Comments
 
LVL 18

Expert Comment

by:chicagoan
ID: 9712208
The auto-blocking feature will adjust firewall settings when it detects serious attacks. Therefore, if a hacker wanted to kick you off a server, the hacker could simply spoof attacks at your computer from the server. The auto-blocking feature would (in theory) then block all further access to the server in question. In order to guard against this, the product only triggers auto-blocking on attacks that are difficult/impossible to spoof. For a list of intrusions that trigger auto-blocking, please look in the file "issuelist.csv" in column 4. Note that you can edit this file yourself in order to cause auto-blocking to occur on attacks that you are concerned about
0
 
LVL 18

Expert Comment

by:chicagoan
ID: 9803991
Does that help?
Can you come back and close the question or post further comment?
0
 

Author Comment

by:ipsystems
ID: 9804008

Hi,
Yes I discover how to block the listed issues with IP|RST but I need to personalize new "customized attack types" to fit my needs....

I try to put other issues and rulez in issuelist.csv and Blackice.ini with a unique number...but sometimes it does not work....

I am trying to block File Downlods from some types and block Http_Posts or containing some words that I consider and trying to attack...


0
 
LVL 18

Accepted Solution

by:
chicagoan earned 1500 total points
ID: 9804033
I'm not sure you can customize blackice in that fashion.
I think what you're looking for is going to have to proxy http for you so that you can examine the http requests.
Have you looked at urlscan?
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/tools/urlscan.asp

btw: you have about 15 questions open in EE...
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the evolution of technology, we have finally reached a point where it is possible to have home automation features like having your thermostat turn up and door lock itself when you leave, as well as a complete home security system. This is a st…
Experts Exchange expands question security options for members.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

927 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question