Solved

Configuring DNS Black Hole on Win2003 Server running Plesk

Posted on 2010-08-14
7
741 Views
Last Modified: 2013-11-08
Hi all,

I was wondering if anyone could help me configure DNS to deny access or else based on third party dns black lists.

My server has several websites open for sql injection and Id like to stop it, first by identifying the IP addresses or domains of the ofenders and denying them access to the websites.

I'm new to all this, so if you can give me clear instructions and suggestions, I appreciate it.

:Thanks

Eder
0
Comment
Question by:Ederwainer
  • 3
  • 3
7 Comments
 

Expert Comment

by:hamadaabdelkader
ID: 33436411
you can confogire this in  iis in secuirty tab and define which ip you want to access your web
0
 

Author Comment

by:Ederwainer
ID: 33436488
Yes, I've come to that option, however, the offenders of my server are the same all over the internet.
So instead of entering them manually one by one, I'd rather get a list from another source and just update it once in a while.

One problem in doing it the way you suggested is that I do not know how to recognize the offender on the traffic logs.

If anybody can help me with identifying them, I'll go with IP blocking for now, as the situation is an emergency.

Thanks!

Eder
0
 
LVL 5

Assisted Solution

by:lscarbor
lscarbor earned 500 total points
ID: 33442592
port 1433 is (normally) access to sql via tsql-- wouldn't blocking it with a firewall and making sure that the only access is internal solve the problem? You don't need to know all the possible sources (unless I don't understand how you are using it).
If you block it at the firewall pointed to the ISP you end access for all.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 5

Accepted Solution

by:
lscarbor earned 500 total points
ID: 33442594
Here's someone showing how to block unauthorized access in a hosting situation:
http://www.webhostingtalk.com/showthread.php?t=364172
0
 

Author Comment

by:Ederwainer
ID: 33447925
Hi Iscarbor.

So far I have done nothing but patch a few websites and clean the infected databases.
Today we applied a patch to one of them and will monitor for the following days to see if it solved the problem.

In the meantime I will look into what you suggested and will post back soon.

Thanks for your help so far.

Eder
0
 
LVL 5

Expert Comment

by:lscarbor
ID: 33448054
I'm happy that you have it working! Thanks for the update.
0
 

Author Closing Comment

by:Ederwainer
ID: 34472238
You gave me some very straiht forward solution to the problem.
Thank you so very much!
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

On July 14th 2015, Windows Server 2003 will become End of Support, leaving hundreds of thousands of servers around the world that still run this 12 year old operating system vulnerable and potentially out of compliance in many organisations around t…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question