Solved

Configuring DNS Black Hole on Win2003 Server running Plesk

Posted on 2010-08-14
7
738 Views
Last Modified: 2013-11-08
Hi all,

I was wondering if anyone could help me configure DNS to deny access or else based on third party dns black lists.

My server has several websites open for sql injection and Id like to stop it, first by identifying the IP addresses or domains of the ofenders and denying them access to the websites.

I'm new to all this, so if you can give me clear instructions and suggestions, I appreciate it.

:Thanks

Eder
0
Comment
Question by:Ederwainer
  • 3
  • 3
7 Comments
 

Expert Comment

by:hamadaabdelkader
ID: 33436411
you can confogire this in  iis in secuirty tab and define which ip you want to access your web
0
 

Author Comment

by:Ederwainer
ID: 33436488
Yes, I've come to that option, however, the offenders of my server are the same all over the internet.
So instead of entering them manually one by one, I'd rather get a list from another source and just update it once in a while.

One problem in doing it the way you suggested is that I do not know how to recognize the offender on the traffic logs.

If anybody can help me with identifying them, I'll go with IP blocking for now, as the situation is an emergency.

Thanks!

Eder
0
 
LVL 5

Assisted Solution

by:lscarbor
lscarbor earned 500 total points
ID: 33442592
port 1433 is (normally) access to sql via tsql-- wouldn't blocking it with a firewall and making sure that the only access is internal solve the problem? You don't need to know all the possible sources (unless I don't understand how you are using it).
If you block it at the firewall pointed to the ISP you end access for all.
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 
LVL 5

Accepted Solution

by:
lscarbor earned 500 total points
ID: 33442594
Here's someone showing how to block unauthorized access in a hosting situation:
http://www.webhostingtalk.com/showthread.php?t=364172
0
 

Author Comment

by:Ederwainer
ID: 33447925
Hi Iscarbor.

So far I have done nothing but patch a few websites and clean the infected databases.
Today we applied a patch to one of them and will monitor for the following days to see if it solved the problem.

In the meantime I will look into what you suggested and will post back soon.

Thanks for your help so far.

Eder
0
 
LVL 5

Expert Comment

by:lscarbor
ID: 33448054
I'm happy that you have it working! Thanks for the update.
0
 

Author Closing Comment

by:Ederwainer
ID: 34472238
You gave me some very straiht forward solution to the problem.
Thank you so very much!
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

A quick step-by-step overview of installing and configuring Carbonite Server Backup.
Learn about cloud computing and its benefits for small business owners.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to moveā€¦

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now