Solved

Configuring DNS Black Hole on Win2003 Server running Plesk

Posted on 2010-08-14
7
740 Views
Last Modified: 2013-11-08
Hi all,

I was wondering if anyone could help me configure DNS to deny access or else based on third party dns black lists.

My server has several websites open for sql injection and Id like to stop it, first by identifying the IP addresses or domains of the ofenders and denying them access to the websites.

I'm new to all this, so if you can give me clear instructions and suggestions, I appreciate it.

:Thanks

Eder
0
Comment
Question by:Ederwainer
  • 3
  • 3
7 Comments
 

Expert Comment

by:hamadaabdelkader
ID: 33436411
you can confogire this in  iis in secuirty tab and define which ip you want to access your web
0
 

Author Comment

by:Ederwainer
ID: 33436488
Yes, I've come to that option, however, the offenders of my server are the same all over the internet.
So instead of entering them manually one by one, I'd rather get a list from another source and just update it once in a while.

One problem in doing it the way you suggested is that I do not know how to recognize the offender on the traffic logs.

If anybody can help me with identifying them, I'll go with IP blocking for now, as the situation is an emergency.

Thanks!

Eder
0
 
LVL 5

Assisted Solution

by:lscarbor
lscarbor earned 500 total points
ID: 33442592
port 1433 is (normally) access to sql via tsql-- wouldn't blocking it with a firewall and making sure that the only access is internal solve the problem? You don't need to know all the possible sources (unless I don't understand how you are using it).
If you block it at the firewall pointed to the ISP you end access for all.
0
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

 
LVL 5

Accepted Solution

by:
lscarbor earned 500 total points
ID: 33442594
Here's someone showing how to block unauthorized access in a hosting situation:
http://www.webhostingtalk.com/showthread.php?t=364172
0
 

Author Comment

by:Ederwainer
ID: 33447925
Hi Iscarbor.

So far I have done nothing but patch a few websites and clean the infected databases.
Today we applied a patch to one of them and will monitor for the following days to see if it solved the problem.

In the meantime I will look into what you suggested and will post back soon.

Thanks for your help so far.

Eder
0
 
LVL 5

Expert Comment

by:lscarbor
ID: 33448054
I'm happy that you have it working! Thanks for the update.
0
 

Author Closing Comment

by:Ederwainer
ID: 34472238
You gave me some very straiht forward solution to the problem.
Thank you so very much!
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
I wrote this article to explain some important DNS concepts that should be known to avoid some typical configuration errors I often see in forums. I assume that what is described here is the typical behavior of Microsoft DNS client. I don't know …
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question