| | Port virus(Using Mikrotik Firewall) | |
| | Author | Message |
---|
Mouse Novice
Number of posts : 77 Age : 34 Location : Mana...do e??? Points : 91 Registration date : 2009-06-05
| Subject: Port virus(Using Mikrotik Firewall) Sat Jun 06, 2009 12:13 am | |
| Taaadaaaaaa.... posting pertama.... hehehehehe... so nintau sebenarnya mo isi apa kasiang..... nintau apa2 kwa..... tadi pas lia2 di document kompi.... eh qta ada port2 virus.... hehehehehe..... qta dengar2 isu kalo di unklab ada pake router server mikrotik(baru isu..... kalo salah.... maaaappppp banget.....) tenang ini source code.... gratis le.... hehehehe..... jadi tinggal copy paste ke setingan firewall di server.... tapi harus lewat New Terminal.... mar bole no kalo mo ketik 1-1....^^ maaf ne kalo basi deng ndak mo tapake....^^ - Spoiler:
/ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1-2 comment="Socks Des Troie, Death" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=31 comment="Agent 31, Hacker's Paradise" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=37 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=41 comment="Deep Throat" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=58 comment="DM Setup" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=69-70 comment="W32.Evala.Worm" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=79 comment="Firehotcker" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=81 comment="Beagle.S" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=85-90 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=99 comment="Common Port for phishing scam sites" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=113 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=119 comment="Happy99" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=121 comment="Jammer Killah" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=129 comment="Password Generator Protocol" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=135-139 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=146 comment="Infector 1.3" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=382 comment="W32.Rotor" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=420 comment="W32.kibuv.b" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=421 comment="tcp Wrappers" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=445 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=456 comment="Hacker's Paradise" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=530 comment="W32.kibuv.worm" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=531 comment="Rasmin" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=555 comment="Stealth Spy, Phaze, 7-11 Trojan" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=559 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=587 comment="Sober worm Variants" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=593 comment="W.32.Sasser worm" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=666 comment="Attack FTP" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=777-778 comment="BackDoor.Netcrack.B" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=880 comment="Common Port for phishing scam sites" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=901-902 comment="Backdoor.Devil" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=911 comment="Dark Shadow" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=999-1001 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1011-1015 comment="Doly Trojan" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1024-1025 comment="Backdoor.lingosky" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1033-1034 comment="NetSpy" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1042 comment="Bla" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1045 comment="Rasmin" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1080-1081 comment="Backdoor.Zagaban" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1111 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1218 comment="Backdoor.Sazo" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1234 comment="More than 3 known worms and trojans use this port"
napa le masih ada...^^ - Spoiler:
/ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1243 comment="Sub Seven" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1245 comment="VooDoo Doll" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1269 comment="Maverick's Matrix" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1394 comment="GoFriller, Backdoor G-1" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1433 comment="w32.spybot.ofn" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1492 comment="FTP99CMP" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1505 comment="FunkProxy " /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1509 comment="Psyber Streaming server" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1533-1534 comment="Backdoor.Miffice" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1534 comment="Bizex.Worm" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1600 comment="Shivka-Burka" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1604 comment="ICA Browser" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1751 comment="Loxbot.d" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1772 comment="Backdoor.NetControle" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1807 comment="SpySender" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1863 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1981 comment="Shockrave" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=1999-2005 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2023 comment="Ripper" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2041 comment="W32.korgo.a" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2080 comment="Backdoor.TJServ" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2090 comment="Backdoor.Expjan" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2115 comment="Bugs" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2140 comment="Deep Throat" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2155 comment="Illusion Mailer" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2283 comment="Dumaru.Y" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2322 comment="backdoor.shellbot" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2333-2335 comment="backdoor.shellbot, Eyeveg.worm.c" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2414 comment="vbs.shania" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2556 comment="Beagle.N" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2565 comment="Striker" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2583 comment="WinCrash" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2716 comment="The Prayer 1.2 -1.3" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2721 comment="Phase Zero" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2745 comment="Beagle.J" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2766 comment="W32.hllw.deadhat.b" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2801 comment="Phineas Phucker" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=2989 comment="Backdoor.Brador.A" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3024 comment="WinCrash" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3028 comment="Backdoor.Wortbot" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3030 comment="W32.Mytob.cz@mm" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3067 comment="W32.korgo.a" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3127-3198 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3256 comment="W32.HLLW.Dax" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3306 comment="Backdoor.Nemog.D" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3332 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3385 comment="w32.Mytob.kp@MM" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3410 comment="W32.mockbot.a.worm" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3456 comment="Backdoor.Fearic" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3459 comment="Eclipse 2000" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3547 comment="Backdoor.Amitis.B" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3700 comment="Portal of Doom" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3737 comment="Backdoor.helios" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=3791 comment="Eclypse" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4001 comment="Backdoor.OptixPro.13.C" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4092 comment="WinCrash" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4128 comment="Backdoor.rcserv" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4242 comment="Backdoor.Nemog.D" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4300 comment="Backdoor.smokodoor" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4387 comment="Phatbot" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4444 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4512 comment="W32.mytob.db" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4567 comment="File Nail" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4590 comment="ICQ Trojan" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4646 comment="Backdoor.Nemog.D" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4661 comment="Backdoor.Nemog.D" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4751 comment="Beagle.U" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4820 comment="Backdoor.tuxder" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4888 comment="W32.Opanki" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4899 comment="W32.RaHack" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=4903 comment="Common Port for phishing scam sites"
ini masih ada lagi....^^ maap kebanyakan...^^ nah itu....^^ kebetulan qta blum ta ambe samua...^^ yang laeng manyusul jo neh....^^ oh io... qta sarankan pas se maso... jangan 1x banyak.... coba akang 1-1 or 10-10.... soalnya tako kage port2 diatas ada yang sama depe port dengan program yang ja pake...^^ hehehehe..... kalo qta sih... cuma virus2 yang qta anggap berbahaya deng banyak tersebar qta ja isi... nanti tu laeng2 plang2 no se maso...^^ maaf neh... so beking2 foll jo qta pe post...^^ /yang laeng qta isi di replay jo neh... soalnya pas qta coba isi 1x.... ndak bisa... hehehe... file to big...^^ | |
| | | Mouse Novice
Number of posts : 77 Age : 34 Location : Mana...do e??? Points : 91 Registration date : 2009-06-05
| Subject: Re: Port virus(Using Mikrotik Firewall) Sat Jun 06, 2009 12:18 am | |
| napa tu 1 le... ndak bisa ta isi kalo banyak2...^^ - Spoiler:
/ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5000-5001 comment="Sokets de Trois v1./Bubbel" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5011 comment="Ootlt" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5031 comment="Net Metropolitan 1.0" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5032 comment="Net Metropolitan 1.04" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5152 comment="Backdoor.laphex.client" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5190 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5321 comment="Firehotcker" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5400-5402 comment="Blade Runner" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5418-5419 comment="Backdoor.DarkSky.B" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5512 comment="Xtcp" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5521 comment="Illusion Mailer" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5550-5558 comment="More than 3 known worms and trojans use this port " /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5569 comment="Robo-Hack" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5588 comment="Backdoor.EasyServ" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5637 comment="PC Crasher" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5638 comment="PC Crasher" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5714 comment="WinCrash" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5741-5742 comment="WinCrash" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5800 comment="Backdoor.Evivinc" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=5900 comment="Backdoor.Evivinc" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6000 comment="LovGate.ak" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6129 comment="W32.mockbot.a.worm" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6180 comment="Common Port for phishing scam sites" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6187 comment="Trojan.Tilser" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6400 comment="The Thing" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6565 comment="Backdoor.Nemog.D" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6631 comment="backdoor.sdbot.ag" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6669-6671 comment="Vampyre, Deep Throat" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6711-6713 comment="Sub Seven, Backdoor.G" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6723 comment="Mstream attack-handler" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6771 comment="Deep Throat" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6776-6777 comment="Sub Seven, Backdoor.G, W32/Bagle@MM" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6789 comment="NetSky.U" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6912 comment="Shxt Heap " /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6939 comment="Indoctrination" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6969 comment="More than 3 known worms and trojans use this port" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=6970 comment="Gate Crasher" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=7000 comment="w32.mytob.mx@mm, Remote Grab" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=7028 comment="Unknown Trojan" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=7043 comment="W32.Spybot.ycl" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=7300-7308 comment="Net Monitor" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=7329 comment="Backdoor.netshadow" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=7410 comment="Backdoor.phoenix" /ip firewall filter add chain=viruses protocol= tcp action=drop dst-port=7597 comment="QaZ -Remote Access Trojan"
| |
| | | y0ng_en9el Pro
Number of posts : 919 Age : 38 Location : In your heart Points : 78 Registration date : 2008-06-10
| Subject: Re: Port virus(Using Mikrotik Firewall) Sat Jun 06, 2009 12:24 am | |
| Bisa lebih perjelas Yud, cara kerjanya ? co masih kurang mudeng ini | |
| | | Mouse Novice
Number of posts : 77 Age : 34 Location : Mana...do e??? Points : 91 Registration date : 2009-06-05
| Subject: Re: Port virus(Using Mikrotik Firewall) Sat Jun 06, 2009 1:03 am | |
| @yong..... cara kerjanya sama kayak firewall... langsung nge drop port2 yang ditulis... tapi hati2.... kadang ada program2 yang jalan di port2 itu...^^
kalo cara inputnya... bisa lewat new terminal... trus tinggal copy paste no...^^ | |
| | | hadest Admin Designer
Number of posts : 220 Age : 35 Location : I coudn't tell u where I am Points : 83 Registration date : 2008-11-25
| Subject: Re: Port virus(Using Mikrotik Firewall) Sat Jun 06, 2009 8:19 pm | |
| | |
| | | Mouse Novice
Number of posts : 77 Age : 34 Location : Mana...do e??? Points : 91 Registration date : 2009-06-05
| Subject: Re: Port virus(Using Mikrotik Firewall) Sat Jun 06, 2009 10:06 pm | |
| | |
| | | cokiki Moderator
Number of posts : 263 Age : 35 Location : RUMPUT Points : 120 Registration date : 2008-06-18
| Subject: Re: Port virus(Using Mikrotik Firewall) Thu Jun 25, 2009 9:12 am | |
| waduh.... obrolan para hacker nih.... Hand's up.... | |
| | | dlmania Newbie
Number of posts : 20 Points : 20 Registration date : 2009-07-07
| Subject: Re: Port virus(Using Mikrotik Firewall) Tue Jul 07, 2009 4:44 pm | |
| New Terminal??? musti maso ka system dang???? | |
| | | dlmania Newbie
Number of posts : 20 Points : 20 Registration date : 2009-07-07
| Subject: Re: Port virus(Using Mikrotik Firewall) Tue Jul 07, 2009 6:54 pm | |
| ck...ck...nd bagus eeeee, torang tre to mo rugi no kalo tu router ngadat!!!!! puasa ba OL....wkwkwkwk | |
| | | jzt.nwbie Administrator
Number of posts : 529 Location : /home/jzt.nwbie Points : 109 Registration date : 2008-09-16
| Subject: Daftar Port TCP/UDP Tue Jul 07, 2009 6:59 pm | |
| | |
| | | Sponsored content
| Subject: Re: Port virus(Using Mikrotik Firewall) | |
| |
| | | | Port virus(Using Mikrotik Firewall) | |
|
Similar topics | |
|
| Permissions in this forum: | You cannot reply to topics in this forum
| |
| |
| April 2024 | Mon | Tue | Wed | Thu | Fri | Sat | Sun |
---|
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | | | | | | Calendar |
|
Social bookmarking |
Bookmark and share the address of UNKLAB FORUM on your social bookmarking website |
|
Visitors | |
|