427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet122/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   118   119   120   121   122   123   124   125   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
Botnet Detection: Tools and Techniques • Chapter 5
149
427_Botnet_05.qxd 1/9/07 9:59 AM Page 149



Block ports 135-139, and 445 
due to numerous exploits aimed at
Microsoft File Share Services.

Block access to port 25
for officially recognized e-mail servers.

Block access to ports (TCP) 1433, and (UDP) 1434
.The
former is due to widespread SQL password-guessing attacks and the
latter due to the SQL slammer, of course.
By blocking these ports and logging the results, you can gain a warning
when some of your internal hosts become infected.You can also configure
the firewall to alert you when these occur, to improve your response time to
these infestations.
Remember, this list is a minimum, but it is effective, given botnet attacks
against Microsoft File Share (CIFS) and spammers as well as certain historic
attacks. A local site with a small set of rules that falls into the bad security
practice called “access all, deny a few” should also factor in local experience
based on local incidents. On the other hand, if you are blocking nearly every-
thing with the classic corporate firewall and you log the blocked traffic, you
will see interesting things. If a bug gets loose on the inside, it might get loose
again, due to either fan-out or the fact that once hackers discover a local hole,
they could try to see if you repeated that hole elsewhere on your site.This is
because infection may arrive over VPNs, mobile hosts (or USB earrings), e-
mail attachments, Web surfing, and even P2P applications. Firewall logging is
an essential part of defense in depth.
T
IP
Here are two classic books on firewalls that are worth reading:
Building Internet Firewalls
(Second Edition), Zwicky, Cooper,
Chapman; O’Reilly, 2000
Firewalls and Internet Security 
(Second Edition), Bellovin, Cheswick,
Rubin; Addison-Wesley, 2003
The first edition is available free online at
www.wilyhacker.com/1e/.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   118   119   120   121   122   123   124   125   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish