Get a damn firewall !!!!!!!!!!!!!!!

Page 7 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.
Feb 7, 2000
1,004
0
0
the point is unless you enable random users to have write access then you dont need a firewall

arguing otherwise, as russ has been doing, is just plain dumb
 

Digobick

Platinum Member
Oct 9, 1999
2,467
0
76
chiwawa626,
<< im not waisting my cpu cycles for a firewall!!! until somthing bad happens to me becasuse i dont have a firewall :) >>

Yeah, and I refuse to take the keys out of my car until somebody steals it. It's attitudes like that that piss me off.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
I have to point out here that there is not much you can do on your end to stop a denial of service attack.

firewall or not you can be flooded. the only way to curb it is to work with your ISP once the attack has begun.

 

nd

Golden Member
Oct 9, 1999
1,690
0
0
This thread is pretty amusing. Never before have I witnessed such a inaccurate and pointless pseudo-technical discussion. Oh well.. this is the off-topic section of a hardware oriented forum after all, so I'll leave you guys alone :)
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
yeah, this thread is a dictionary of misinformation

JosephStalinator,
if you think that people can't execute files on your machine with netbios ports open then you are incredibly naive, even stupid to refute FACTs given to you by some very knowledgable people aka RUSS. there are common exploits for most MS operating systems to give total admin access to the server service, once logged in as a service you can do anything you like, change access, run programs install scripts, EVERYTHING!!!

and another thing, all these soho routers ARE NOT FIREWALLS. A firewall is a completely different beast then all this home gear. The home gear really only does NAT and some simple port based access lists. No stateful inspection of frames and conversations, security policy setups (anti-spoofing, anti fragments, anti-syn attacks, etc), nothing.

But NAT alone and port blocking is very good for a home user.

spidey
network security consultant
 

Eug

Lifer
Mar 11, 2000
24,176
1,816
126


<< there are common exploits for most MS operating systems to give total admin access to the server service, once logged in as a service you can do anything you like, change access, run programs install scripts, EVERYTHING!!! >>

How many of the trojans actually work this way? I was under the impression the ones in the wild did not allow this sort of access until run somehow by the local computer.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
EUG,

i won't go into the details because that would just be wrong on this forum. I do not proclaim to be a hacker, I just get paid to stop them. once you run various programs against this port you can gain admin priveleges. once you have those you can send any command you wish to the netbios port, or upload the trojan to gain access on another port.

bottom line, once you have admin access you can do anything and everything you could do as if you we're sitting in front of the machine. to make life easier you can install or run various programs so you don't have to send it RAW SMB to the netbios port and can use a more client-server based approach.
 

FrancesBeansRevenge

Platinum Member
Jun 6, 2001
2,181
0
0


<< yeah, this thread is a dictionary of misinformation

JosephStalinator,
if you think that people can't execute files on your machine with netbios ports open then you are incredibly naive, even stupid to refute FACTs given to you by some very knowledgable people aka RUSS. there are common exploits for most MS operating systems to give total admin access to the server service, once logged in as a service you can do anything you like, change access, run programs install scripts, EVERYTHING!!!

and another thing, all these soho routers ARE NOT FIREWALLS. A firewall is a completely different beast then all this home gear. The home gear really only does NAT and some simple port based access lists. No stateful inspection of frames and conversations, security policy setups (anti-spoofing, anti fragments, anti-syn attacks, etc), nothing.

But NAT alone and port blocking is very good for a home user.

spidey
network security consultant
>>



JosephStalinator, OWNED.
 

Eug

Lifer
Mar 11, 2000
24,176
1,816
126
Thanks for the info spidey. No, I'm no hacker either, as is obvious from my posts. :p

I'm not sure you got the gist of my question though. 99% of the DDOS PCs out there seem to be from trojan viruses poking around, running through sequential IPs or whatever. When the trojans find an IP with the open port it drops a copy of itself in (or so I thought). My question is whether any of these trojans actually activate their offspring directly. My understanding was they didn't and couldn't (at least for now).

Would what you're suggesting not require a human at the other end of the computer, at least with the current state of trojans?

Just wondering.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
oh, I see EUG.

you're talking about trojans. small programs that seem harmless but can be instructed to attack at a certian time or on demand.

I'm talking about straight hacking...gaining access or control of a system you do not own not caring if there is a human on the other end (not many servers have a dude at the keyboard)

CYA!
 

Woodie

Platinum Member
Mar 27, 2001
2,747
0
0
I should've checked in last night..I missed a good fire-fight.

I'm w/ Spidey07, it's my job. However, I must admit that I have ETHICALLY hacked into Windows boxes, and it didn't require the &quot;user&quot; to do anything. Most targets are usually servers, which don't reboot often, and don't usually have users logged in to.

The Windows problems have to do with the fact that &quot;file sharing&quot; actually opens up a number of different ways to get onto the box, not just read/write file bits. The vulnerabilities are in the whole system, not just one part of it.

--Woodie
 

Lore

Diamond Member
Oct 24, 1999
3,624
1
76
spidey:

This thread originated with arguments about trojans. We are /not/ talking about straight hacking - and I don't think we ever were. I think we were arguing the ability of two programs - Zone Alarm and Blackice - to stop people from accessing trojaned computers.