Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

tens of thousands of hack attempts in my server per day....need advice

Posted on 2012-03-17
5
Medium Priority
?
589 Views
Last Modified: 2012-08-13
when i check my security logs on my windows 2008 web server, I see 42,000 entries, almost all of them hack attempts over the last few days.  they occur every few seconds, relentlessly (see screenshot).

i'm trying to figure out what port they are using?  For example, in this screenshot, the error details say "Source Port:  50191" but never tell me what destination port.  I want to know what port they are hitting my server.  I don't even want my server asking for credentials.  I'd rather they just get stonewalled right out of the gate.

I know that I have RDP open on the server so that I can remote desktop in.  Are these all coming through via RDP?  Is someone literally going to an RDP login screen and using a bot to try thousands of combinations?  Or are these hack attempts possibly using some other port?  How can I tell?
hacks.jpg
0
Comment
Question by:arthurh88
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 30

Expert Comment

by:IanTh
ID: 37734245
rdp exploit has been confirmed by m$
0
 
LVL 30

Expert Comment

by:IanTh
ID: 37734250
0
 
LVL 18

Assisted Solution

by:Garry Glendown
Garry Glendown earned 1000 total points
ID: 37734304
To find the destination (though, given a windows server, there are so many possibilities ;) ), you could use something like Wireshark to log the traffic ...
Are you running the Server directly on the Internet without any Firewall in front? If so, are you sure it hasn't been broken into yet? (if you say yes, I assume either you're lying or you just don't know it yet) Personally, I do not advise any customer to run any Windows-based system (or any system for that matter) without protection in front, or at least a decent packet-filter on it. There are too many holes in software to not use a firewall. Then, only allow those services that absolutely have to be accessible from the Internet - any "internal" access of a closed group of people should always be done through some VPN technique, or limited to certain IP ranges (though this only limits the risk)
0
 
LVL 77

Accepted Solution

by:
Rob Williams earned 1000 total points
ID: 37735133
If RDP is enabled, even with a firewall and port forwarding, you will be guaranteed to be hit from 100 to 50,000 times a week. Changing the listening port will reduce this drastically but anyone using TSgrinder will still find the open port fairly quickly.  As others suggested using a VPN, restricting the IP's from which the connection is allowed, or using TS Gateway service on port 443 substantially improves security.

As also suggested by others make sure you patch your server immediately. A severe security alert was released last week pertaining to RDP:
http://technet.microsoft.com/en-us/security/bulletin/ms12-020

Make sure in Group Policy you have complex passwords and account lockouts enforced.

What "Logon type" is shown in the event log details (# 1-10)?
0
 
LVL 9

Expert Comment

by:newmath
ID: 37735165
I agree with the recommendation to patch up your server if you have rdp open public facing. But, you really should employ some sort of VPN on top of this setup.
0

Featured Post

Tech or Treat!

Submit an article about your scariest tech experience—and the solution—and you’ll be automatically entered to win one of 4 fantastic tech gadgets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For anyone that has accidentally used newSID with Server 2008 R2 (like I did) and hasn't been able to get the server running again because you were unlucky (as I was) and had no backups - I was able to get things working by doing a Registry Hive rec…
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question