How to protect your network when under attack

Note to all Network Administrators ;
Mode of attack thru port 80 and 111(port mapper)
If you open up port 111, I can see every available resources on your network and I can easily bypass any security you setup.
Solution run proxy server services but do not use standard 538(TCP & UDP) for gdomapping, use other ports. Once you configure the access of 1 pc without any issue, you then then expand to cover your entire network. Therefore you must be very familar with your firewall configurations, the difference between IP4 & IP6 protocol. There is no firewall software can block IP6, so you need to manually filter and isolate it, especially unknown packets, dropping all the packets. Therefore do not upgrade to IP6 yet but fall back on IP4 as the attackers are using IP6 to attack all networks.

– Contributed by Oogle

Author: Gilbert Tan TS

IT expert with more than 20 years experience in Multiple OS, Security, Data & Internet , Interests include AI and Big Data, Internet and multimedia. An experienced Real Estate agent, Insurance agent, and a Futures trader. I am capable of finding any answers in the world you want as long as there are reports available online for me to do my own research to bring you closest to all the unsolved mysteries in this world, because I can find all the paths to the Truth, and what the Future holds. All I need is to observe, test and probe to research on anything I want, what you need to do will take months to achieve, all I need is a few hours.​

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s