FTP, IIS 5.0 hack attemps
Results 1 to 10 of 12

Thread: FTP, IIS 5.0 hack attemps

Hybrid View

  1. #1
    Junior Member
    Join Date
    Jul 2009
    Posts
    7

    Exclamation FTP, IIS 5.0 hack attemps

    Short story long,

    Running a Linksys RV082 firwall with a IIS 5.0 (W2k) machine as an ftp server.

    We've had many people from overseas attack the site attempting to crack the password, usually very generic login names. none have been even close but this is a continuing attck. Initally the owner was blocking there WAN IP in the firewall by doing dnstools lookup.

    Currently, we now have all trusted WAN Ip from customers accessing the FTP setup as port 21 Allowed. Everyone else is using default 21 Deny. Full access to LAN.

    Yet were still getting logs like such:
    2009-07-06 01:14:26 118.216.89.250 - MSFTPSVC1 DATA1 192.168.*.* 21 [62]PASS - 530 1326
    2009-07-06 01:14:27 118.216.89.250 Administrator MSFTPSVC1 DATA1 192.168.*.* 21 [62]USER Administrator 331 0

    We adjsuted IIS to do the same thing as the firewall and deny all and only allow our trusted WAN IPs but then we started having other issues with users not being able to log in. (after running a microsoft fix that undid those changes ) were back to square one.

    Any idea how this is possible? I've had many people go over our firewall and it appears to be solid. A sheilds up test however will show the port as open. (when done from the ftp server)

    Please help!
    Phillip.

  2. #2
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,250
    Quote Originally Posted by heavyfreak View Post
    Short story long,

    Running a Linksys RV082 firwall with a IIS 5.0 (W2k) machine as an ftp server.

    We've had many people from overseas attack the site attempting to crack the password, usually very generic login names. none have been even close but this is a continuing attck. Initally the owner was blocking there WAN IP in the firewall by doing dnstools lookup.

    Currently, we now have all trusted WAN Ip from customers accessing the FTP setup as port 21 Allowed. Everyone else is using default 21 Deny. Full access to LAN.

    Yet were still getting logs like such:
    2009-07-06 01:14:26 118.216.89.250 - MSFTPSVC1 DATA1 192.168.*.* 21 [62]PASS - 530 1326
    2009-07-06 01:14:27 118.216.89.250 Administrator MSFTPSVC1 DATA1 192.168.*.* 21 [62]USER Administrator 331 0

    We adjsuted IIS to do the same thing as the firewall and deny all and only allow our trusted WAN IPs but then we started having other issues with users not being able to log in. (after running a microsoft fix that undid those changes ) were back to square one.

    Any idea how this is possible? I've had many people go over our firewall and it appears to be solid. A sheilds up test however will show the port as open. (when done from the ftp server)

    Please help!
    Phillip.
    Sorry I can't help you with the firewall, but It seems as if it's doing it's job. If it was a CISCO router and I had no customers in South Korea, I'd just block the entire country and set a NULL route so as not to clutter up my logs. As long as you are not in a D or DDoS situation... I'd just reconfigure IIS to allow only trusted IP's and be done with it.

    Oh yea **** SHIELDS UP! worthless tool!
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

  3. #3
    Junior Member
    Join Date
    Jul 2009
    Posts
    7
    how to you block a country, or is this only in Cisco equipment. Are there standard IP / subnets I can place a deny rule for that would mock this feature?

    do you have any other recommendations for checking open ports or just the plain old telnet (port)

    Note:

    even if per say the did mange to crack the login and password. Would it in theory still deny them being there wan is not matching or is the simple fact they get a login box suggesting that they would beable to access. In short. When accessing an ftp site. That has everyone denyed, does it still give a login prompt?
    Last edited by heavyfreak; July 9th, 2009 at 02:13 AM.

  4. #4
    Senior Member IKnowNot's Avatar
    Join Date
    Jan 2003
    Posts
    792
    I've had many people go over our firewall and it appears to be solid.
    Apparently not since you are getting those entries on your IIS.

    I have never used that router, but I believe for anyone to help you would have to supply the network layout and your firewall rules!

    Is the IIS box on the DMZ ( WAN2 ) port?
    From the documentation, one of the default rules is
    All traffic from the WAN to the DMZ is allowed.
    Are your rules for the DMZ set up to override this? ( there are rules specific for wan2, and not just included in the LAN rules? )

    The user guide suggests this is possible, though again, I have never used that router.
    " And maddest of all, to see life as it is and not as it should be" --Miguel Cervantes

  5. #5
    Junior Member
    Join Date
    Jul 2009
    Posts
    7
    Quote Originally Posted by IKnowNot View Post
    Apparently not since you are getting those entries on your IIS.

    I have never used that router, but I believe for anyone to help you would have to supply the network layout and your firewall rules!

    Is the IIS box on the DMZ ( WAN2 ) port?
    From the documentation, one of the default rules is

    Are your rules for the DMZ set up to override this? ( there are rules specific for wan2, and not just included in the LAN rules? )

    The user guide suggests this is possible, though again, I have never used that router.

    No, Currectly they are only using Wan1 port WAN2 (DMZ is not configured but disabled.)

    Do you suggest I look into DMZ and configure the IIS server to use this port?

    Thanks for the help fellahs!
    Phillip.

  6. #6
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,250
    Quote Originally Posted by heavyfreak View Post
    how to you block a country, or is this only in Cisco equipment. Are there standard IP / subnets I can place a deny rule for that would mock this feature?

    do you have any other recommendations for checking open ports or just the plain old telnet (port)

    Note:

    even if per say the did mange to crack the login and password. Would it in theory still deny them being there wan is not matching or is the simple fact they get a login box suggesting that they would beable to access. In short. When accessing an ftp site. That has everyone denyed, does it still give a login prompt?
    For port scanning use nmap. But remember you have to have open ports.

    For blocking and entire country. Not exactly what I meant. Sorry. I'd probably block
    118.216.0.0 to 118.223.255.255 (Lookup via dnsstuff.com)

    Most important DMZ!
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

  7. #7
    Junior Member
    Join Date
    Jul 2009
    Posts
    7
    Quote Originally Posted by dinowuff View Post
    For port scanning use nmap. But remember you have to have open ports.

    For blocking and entire country. Not exactly what I meant. Sorry. I'd probably block
    118.216.0.0 to 118.223.255.255 (Lookup via dnsstuff.com)

    Most important DMZ!
    We seem to get hit by a large range of IP, while I'll this is initially how we got into trouble to start off.
    The router will only hold up to 50+ rules and we've used many of them already doing the WAN ftp trust.

    I suppose I'm going to look into DMZ and see if it will do what I need.

    ::bangs head on desk::

    Thanks again, Fellahs!

  8. #8
    Senior Member IKnowNot's Avatar
    Join Date
    Jan 2003
    Posts
    792
    If you are not using WAN2, then the IIS box in on the LAN and you are port forwarding port 21 to that box?

    Guess here is you have a rule or two out of order, or the nat-ing is causing the rules to be ignored.

    Again, without seeing the complete rule set and the network setup there is no way for us to know.

    And without having one to play with here is even worse!

    So what type rule-set are you using to block the ftp?

    Are you using rules on the LAN or WAN1?

    Again, you should be able to write rules ( as you say you know the IPs of your customers ) to allow only them in and block everyone else. Then you would not have to worry about blocking certain countries at all.
    " And maddest of all, to see life as it is and not as it should be" --Miguel Cervantes

Similar Threads

  1. TTL and traceroute: The forgotten hack.
    By Tiger Shark in forum The Security Tutorials Forum
    Replies: 19
    Last Post: May 29th, 2004, 05:55 PM
  2. A Professional Hack
    By Lone1337 in forum AntiOnline's General Chit Chat
    Replies: 7
    Last Post: August 23rd, 2002, 05:16 PM
  3. Rant: How do I hack Hotmail?
    By smirc in forum AntiOnline's General Chit Chat
    Replies: 21
    Last Post: June 7th, 2002, 05:03 PM
  4. hehe...for those who hate AO newbies...
    By zigar in forum AntiOnline's General Chit Chat
    Replies: 10
    Last Post: February 22nd, 2002, 02:24 PM
  5. how to hack cisco a router... wow
    By NUKEM6 in forum Non-Security Archives
    Replies: 1
    Last Post: February 3rd, 2002, 11:28 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •