Poslao: 07 Avg 2005 00:04
|
offline
- RIA
- Prijatelj foruma
- Pridružio: 20 Feb 2005
- Poruke: 2841
- Gde živiš: Around Belgrade
|
potreban mi je program kojim bih mogao da zatvorim odredjene portove.Nadam se da port TCP 135 je bezbedno da se zatvori kao i UDP 1026.
Zna li neko koristan program ? znaci ne da "stealth"-ujem,ne da sprecim upad kroz njih, nego da ih potpuno zatvorim.
|
|
|
Registruj se da bi učestvovao u diskusiji. Registrovanim korisnicima se NE prikazuju reklame unutar poruka.
|
|
|
Poslao: 07 Avg 2005 19:50
|
offline
- RIA
- Prijatelj foruma
- Pridružio: 20 Feb 2005
- Poruke: 2841
- Gde živiš: Around Belgrade
|
Instalirao pre par meseci..I zatvorio portove 136-139.Dakle,nisam pitao kako da zatvorim net bios jer sam ga skoro potpuno zatvorio,samo jos taj 135 port,mada bih voleo i taj udp port da zatvorim.
Jos neki predlozi ?
|
|
|
|
Poslao: 07 Avg 2005 21:41
|
offline
- Pridružio: 28 Jul 2005
- Poruke: 18
- Gde živiš: Beograd
|
Ukoliko imaš Win XP SP2, možeš da zatvoriš port TCP 135 i UDP 1026 u samom Firewall-u (u Windows Firewall, Advanced, Settings, tab Services, klikneš na Add i dodaš servis koji želiš da blokiraš, tj. TCP 135 i UDP 1026). Možeš da imenuješ te servise koje blokiraš, tj. TCP 135 verovatno gađa W32.Blaster crv, a UDP 1026 je Calendar Access Protocol, a koristi ga i Messenger i spameri često gađaju taj port sa porukama kao što je ova:
|
|
|
|
Poslao: 08 Avg 2005 00:10
|
offline
- browser
- Ugledni građanin
- Pridružio: 14 Apr 2005
- Poruke: 381
- Gde živiš: Drugo ćoše levo iza Nedođije
|
Uz pomoc KAH zatvara se i blokira bilo koji port. Kod mene to radi za sada.
|
|
|
|
Poslao: 08 Avg 2005 00:27
|
offline
- Vladimir
- Prijatelj foruma
- Pridružio: 10 Feb 2005
- Poruke: 3549
|
@browser
Jesi siguran?.,poseti ShiledsUP,pa kazi ondak,nesto ne verujem,ali moze biti.Ajde probaj pa javi.
|
|
|
|
Poslao: 08 Avg 2005 09:08
|
offline
- browser
- Ugledni građanin
- Pridružio: 14 Apr 2005
- Poruke: 381
- Gde živiš: Drugo ćoše levo iza Nedođije
|
Samo mi kazi sta je "ShiledsUP". Nepznato mi je. Nebih da uletim u neke koprive ...
|
|
|
|
|
|
Poslao: 08 Avg 2005 22:53
|
offline
- browser
- Ugledni građanin
- Pridružio: 14 Apr 2005
- Poruke: 381
- Gde živiš: Drugo ćoše levo iza Nedođije
|
KAd su ljubicice u pitanju, evo rezultata sa GRC sajta:
"Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice."
"Your Internet port 139 does not appear to exist!
One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection attempts to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion. "
"Unable to connect with NetBIOS to your computer.
All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet "
A na kraju daje objasnjenje:
=> A "Stealth" port is one that completely ignores and simply "drops" any incoming packets without telling the sender whether the port is "Open" or "Closed" for business. When all of your system's ports are stealth (and assuming that your personal firewall security system doesn't make the mistake of "counter-probing" the prober), your system will be completely opaque and invisible to the random scans which continually sweep through the Internet.
Even if this machine had previously been scanned and logged by a would-be intruder, a methodical return to this IP address will lead any attacker to believe that your machine is turned off, disconnected, or no longer exists. You couldn't ask for anything better. Your personal firewall or NAT router protected system is acting like a black hole for TCP/IP packets. That's very cool.
If your system did NOT show up as Stealth, but you would like it to, you will need to use one of the many free or inexpensive personal firewalls that are now widely available. Of the many firewalls on that list, we recommend (in alphabetical order) firewalls from Agnitum, Kerio, Norton, Sygate, Tiny, and ZoneLabs. I describe the operation of personal firewalls on this page.
Dopuna: 08 Avg 2005 23:53
Zaboravih da kazem da je za ovo zasluzan KAH.
|
|
|
|