<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MBLAST in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057275#M6339</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;MSBLAST worm uses windows RPC port. viz. TCP 135.&lt;BR /&gt;&lt;BR /&gt;#iptables -I INPUT -i eth+ -p tcp --dport 135 -j DROP&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;&lt;BR /&gt;U.SivaKumar&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Wed, 27 Aug 2003 06:37:30 GMT</pubDate>
    <dc:creator>U.SivaKumar_2</dc:creator>
    <dc:date>2003-08-27T06:37:30Z</dc:date>
    <item>
      <title>MBLAST</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057272#M6336</link>
      <description>Hi!&lt;BR /&gt;&lt;BR /&gt;Just want to know if iptables can blick the exploit being done by MBLAST and how can it be done?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;LAT&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 26 Aug 2003 23:45:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057272#M6336</guid>
      <dc:creator>Leovino A. Trinidad, Jr</dc:creator>
      <dc:date>2003-08-26T23:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: MBLAST</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057273#M6337</link>
      <description>If you find out what port its using, you can simply shut the port explicitly in iptables.&lt;BR /&gt;&lt;BR /&gt;I'm uploading a sample iptables file that has lots of good examples.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 27 Aug 2003 00:54:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057273#M6337</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-08-27T00:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: MBLAST</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057274#M6338</link>
      <description>And you know it uses ports 135, 139, 445 and 4444. Using Steven's example iptable should let you know how to block these ports.&lt;BR /&gt;&lt;BR /&gt;Beware that ports 135 and 139 are also used by windows. Be careful on blocking if you use RRAS behind your firewall (which you shouldn't...)&lt;BR /&gt;&lt;BR /&gt;J</description>
      <pubDate>Wed, 27 Aug 2003 05:36:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057274#M6338</guid>
      <dc:creator>Jerome Henry</dc:creator>
      <dc:date>2003-08-27T05:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: MBLAST</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057275#M6339</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;MSBLAST worm uses windows RPC port. viz. TCP 135.&lt;BR /&gt;&lt;BR /&gt;#iptables -I INPUT -i eth+ -p tcp --dport 135 -j DROP&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;&lt;BR /&gt;U.SivaKumar&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 27 Aug 2003 06:37:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057275#M6339</guid>
      <dc:creator>U.SivaKumar_2</dc:creator>
      <dc:date>2003-08-27T06:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: MBLAST</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057276#M6340</link>
      <description>Hi!&lt;BR /&gt;&lt;BR /&gt;Thank you for all your responses! It's good but will it really drop or ignore all msblast packets? I'm just making it sure it will work.&lt;BR /&gt;&lt;BR /&gt;To give you the background of my problem, our system are infected by msblast (which the stations are being cured)and the virus keeps on bombarding the line going to our default route which is our Firewall/Proxy server. The problem is, it's not with the Linux machine but with the 3com 4400 switch where the fw/proxy is connected. It cannot take huge packets (produce by msblast) that causes it to hang. I already made a rule in iptable wherein it will drop port 135,139,445 request and, still no positive result. I have not yet included port 4444.&lt;BR /&gt;&lt;BR /&gt;Is iptables the solution? Or will I do a work-around in our network system.&lt;BR /&gt;&lt;BR /&gt;Again, thank you.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;LAT</description>
      <pubDate>Wed, 27 Aug 2003 21:31:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057276#M6340</guid>
      <dc:creator>Leovino A. Trinidad, Jr</dc:creator>
      <dc:date>2003-08-27T21:31:55Z</dc:date>
    </item>
    <item>
      <title>Re: MBLAST</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057277#M6341</link>
      <description>What the iptables rule will do is stops the corresponding packets, unabling them to enter the linux box and so to be propagated to the other NIC and subnet...&lt;BR /&gt;But it won't remove the virus... If you have infected systems, you should decontaminate them, then use your linux box as door keeper to the internet gate...&lt;BR /&gt;&lt;BR /&gt;J</description>
      <pubDate>Thu, 28 Aug 2003 12:17:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mblast/m-p/3057277#M6341</guid>
      <dc:creator>Jerome Henry</dc:creator>
      <dc:date>2003-08-28T12:17:02Z</dc:date>
    </item>
  </channel>
</rss>

