0% found this document useful (0 votes)
234 views

Firewall Mikrotik Brute Force

This document contains firewall rules that block common ports and protocols used by viruses and malware to prevent infection. It creates a "virus" chain and adds rules to drop traffic for specific ports to block worms, trojans, and botnets like Blaster, Sasser, MyDoom, Trinoo, and Conficker. The rules target TCP and UDP traffic on ports commonly used in attacks by these viruses.

Uploaded by

Peel Duatiga Net
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
234 views

Firewall Mikrotik Brute Force

This document contains firewall rules that block common ports and protocols used by viruses and malware to prevent infection. It creates a "virus" chain and adds rules to drop traffic for specific ports to block worms, trojans, and botnets like Blaster, Sasser, MyDoom, Trinoo, and Conficker. The rules target TCP and UDP traffic on ports commonly used in attacks by these viruses.

Uploaded by

Peel Duatiga Net
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

/ip firewall filter add chain=virus protocol=tcp dst-port=135-139 action=drop comment="Drop Blaster Worm" add chain=virus protocol=udp dst-port=135-139

action=drop comment="Drop Messenge r Worm" add chain=virus protocol=tcp dst-port=445 action=drop comment="Drop Blaster Worm " add chain=virus protocol=udp dst-port=445 action=drop comment="Drop Blaster Worm " add chain=virus protocol=tcp dst-port=593 action=drop comment="________" add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment="________" add chain=virus protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom" add chain=virus protocol=tcp dst-port=1214 action=drop comment="________" add chain=virus protocol=tcp dst-port=1363 action=drop comment="ndm requester" add chain=virus protocol=tcp dst-port=1364 action=drop comment="ndm server" add chain=virus protocol=tcp dst-port=1368 action=drop comment="screen cast" add chain=virus protocol=tcp dst-port=1373 action=drop comment="hromgrafx" add chain=virus protocol=tcp dst-port=1377 action=drop comment="cichlid" add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment="Worm" add chain=virus protocol=tcp dst-port=2745 action=drop comment="Bagle Virus" add chain=virus protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y" add chain=virus protocol=tcp dst-port=2535 action=drop comment="Drop Beagle" add chain=virus protocol=tcp dst-port=2745 action=drop comment="Drop Beagle.C-K"

add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment="Drop MyDoom " add chain=virus protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor Op tixPro" add chain=virus protocol=tcp dst-port=4444 action=drop comment="Worm" add chain=virus protocol=udp dst-port=4444 action=drop comment="Worm" add chain=virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser" add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B" add chain=virus protocol=tcp dst-port=9898 action=drop comment="Drop Dabber.A-B" add chain=virus protocol=tcp dst-port=10000 action=drop comment="Drop Dumaru.Y" add chain=virus protocol=tcp dst-port=10080 action=drop comment="Drop MyDoom.B" add chain=virus protocol=tcp dst-port=12345 action=drop comment="Drop NetBus" add chain=virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2" add chain=virus protocol=tcp dst-port=27374 action=drop comment="Drop SubSeven" add chain=virus protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot,Ag obot, Gaobot" add chain=virus protocol=udp dst-port=12667 action=drop comment="Trinoo" disable d=no add chain=virus protocol=udp dst-port=27665 action=drop comment="Trinoo" disable d=no add chain=virus protocol=udp dst-port=31335 action=drop comment="Trinoo" disable d=no add chain=virus protocol=udp dst-port=27444 action=drop comment="Trinoo" disable d=no add chain=virus protocol=udp dst-port=34555 action=drop comment="Trinoo" disable

d=no add chain=virus protocol=udp dst-port=35555 action=drop comment="Trinoo" disable d=no add chain=virus protocol=tcp dst-port=27444 action=drop comment="Trinoo" disable d=no add chain=virus protocol=tcp dst-port=27665 action=drop comment="Trinoo" disable d=no add chain=virus protocol=tcp dst-port=31335 action=drop comment="Trinoo" disable d=no add chain=virus protocol=tcp dst-port=31846 action=drop comment="Trinoo" disable d=no add chain=virus protocol=tcp dst-port=34555 action=drop comment="Trinoo" disable d=no add chain=virus protocol=tcp dst-port=35555 action=drop comment="Trinoo" disable d=no add action=drop chain=forward comment=";;Block W32.Kido - Conficker" disabled=no protocol=udp src-port=135-139,445 add action=drop chain=forward comment="" disabled=no dst-port=135-139,445 protoc ol=udp add action=drop chain=forward comment="" disabled=no protocol=tcp src-port=135-1 39,445,593 add action=drop chain=forward comment="" disabled=no dst-port=135-139,445,593 pr otocol=tcp

You might also like