Do you need a connection to that DNS server?  If not then add the host/domain 
to /etc/hosts.deny depending on what you feel is appropriate, this also
assumes 
that you are running unix and tcpd.  If not you might put an acl on your
perimeter
router that drops packets from that host/domain.  Well the admin you spoke
with can
at least turn the machine off as it is being used as a jumping point for
attacks.
You could also point the admin in the direction of
http://www.trustedsystems.com/
for a guide on securing NT, NetBUS and the recent IIS vulnerability eEye
disclosed.
Of course none of this means that they maybe able to do anything more for
you right
now but they should be better equipped to respond more effectively then
simply 
shrugging and saying sorry in the future.

Cheers,
Cohen

At 11:22 AM 6/28/99 -0400, you wrote:
>Hi all 
>
>Can anyone help me with this problem. Someone has run a  portscan program
>and a brute force tool against one of my servers. I traced the intruder back
>to a dns server in Mexico. I called the company in Mexico and the admin
>there was very grateful that I had alerted him but he did not have a clue on
>how to stop it. He told me the DNS server was NT. So I would appreciate any
>help on this as I believe I have done all I can. Please correct me if I  am
>wrong.
>
>Thanks
>
>Bryan
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]
>
>
--
Cohen Liota                             
Information Security Specialist         416.815.3041 - v
Secure Computing Corporation            416.815.3001 - f
[EMAIL PROTECTED]         http://www.securecomputing.com/
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to