Solved

Configuring DNS Black Hole on Win2003 Server running Plesk

Posted on 2010-08-14
7
744 Views
Last Modified: 2013-11-08
Hi all,

I was wondering if anyone could help me configure DNS to deny access or else based on third party dns black lists.

My server has several websites open for sql injection and Id like to stop it, first by identifying the IP addresses or domains of the ofenders and denying them access to the websites.

I'm new to all this, so if you can give me clear instructions and suggestions, I appreciate it.

:Thanks

Eder
0
Comment
Question by:Ederwainer
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 

Expert Comment

by:hamadaabdelkader
ID: 33436411
you can confogire this in  iis in secuirty tab and define which ip you want to access your web
0
 

Author Comment

by:Ederwainer
ID: 33436488
Yes, I've come to that option, however, the offenders of my server are the same all over the internet.
So instead of entering them manually one by one, I'd rather get a list from another source and just update it once in a while.

One problem in doing it the way you suggested is that I do not know how to recognize the offender on the traffic logs.

If anybody can help me with identifying them, I'll go with IP blocking for now, as the situation is an emergency.

Thanks!

Eder
0
 
LVL 5

Assisted Solution

by:lscarbor
lscarbor earned 500 total points
ID: 33442592
port 1433 is (normally) access to sql via tsql-- wouldn't blocking it with a firewall and making sure that the only access is internal solve the problem? You don't need to know all the possible sources (unless I don't understand how you are using it).
If you block it at the firewall pointed to the ISP you end access for all.
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 5

Accepted Solution

by:
lscarbor earned 500 total points
ID: 33442594
Here's someone showing how to block unauthorized access in a hosting situation:
http://www.webhostingtalk.com/showthread.php?t=364172
0
 

Author Comment

by:Ederwainer
ID: 33447925
Hi Iscarbor.

So far I have done nothing but patch a few websites and clean the infected databases.
Today we applied a patch to one of them and will monitor for the following days to see if it solved the problem.

In the meantime I will look into what you suggested and will post back soon.

Thanks for your help so far.

Eder
0
 
LVL 5

Expert Comment

by:lscarbor
ID: 33448054
I'm happy that you have it working! Thanks for the update.
0
 

Author Closing Comment

by:Ederwainer
ID: 34472238
You gave me some very straiht forward solution to the problem.
Thank you so very much!
0

Featured Post

Webinar: Aligning, Automating, Winning

Join Dan Russo, Senior Manager of Operations Intelligence, for an in-depth discussion on how Dealertrack, leading provider of integrated digital solutions for the automotive industry, transformed their DevOps processes to increase collaboration and move with greater velocity.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
I wrote this article to explain some important DNS concepts that should be known to avoid some typical configuration errors I often see in forums. I assume that what is described here is the typical behavior of Microsoft DNS client. I don't know …
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question