Does anyone know of a way to find a hackers MAC address and block all traffic
via the MikroTik. I am running version 2.9.43
Thanks
___
Mikrotik mailing list
Mikrotik@mail.butchevans.com
http://www.butchevans.com/mailman/listinfo/mikrotik
Visit
What is being hacked? If they have any skills at all, they know how to
change a mac address. MAC based block lists do not work for long
Brian Bearce wrote:
Does anyone know of a way to find a hackers MAC address and block all traffic
via the MikroTik. I am running version 2.9.43
Thanks
right now they are basically IP hunting. As soon as I find them and place
restrictions on the IP. The find another. I use static IP's so their not
getting DHCP.
Original Message ---
What is being hacked? If they have any skills at all, they know how to
change a mac
right now they are basically IP hunting. As soon as I find them and place
restrictions on the IP. The find another. I use static IP's so their not
getting DHCP.
Original Message ---
What is being hacked? If they have any skills at all, they know how to
change a mac
On Wed, 2009-01-14 at 10:32 -0600, Brian Bearce wrote:
Does anyone know of a way to find a hackers MAC address and block all traffic
via the MikroTik. I am running version 2.9.43
If you know their current IP:
/ip arp print from=[find address=CURR.ENT.IP.ADDRESS]
That will give you their MAC.
Does it make a difference if these are private IP's 192.168.*.*? These are
NATed via another router.
When I key in the command below it either returns me to the prompt or I get
invalid Item number
It is known the IP they are using.
Original Message ---
On Wed, 2009-01-14
If they're NAT'ed behind a router you won't see the MACs on the current
router. Do the command on the another router. When a masquerade rule or
NAT is involved, ARP and switches are replaced with routing basically.
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Ahh. I have people try this. I found the best way to deal with them is
to force all http from them to undesirable places (the rest is blocked
out right). Every now and then one will call me up and explain I was
uh, on your network and all I can get is this goat web site Yea, you
were doing more
What kind of rules do you use for this.
Still learning the in's and out's to this box.
Original Message ---
Ahh. I have people try this. I found the best way to deal with them is
to force all http from them to undesirable places (the rest is blocked
out right). Every now
Looking for a script to help Build multiple simple queues at one shot. I got
the one below from the MT forums but it is for V2 and its not working with
V3. Anyone got a good link
Steve Barnes
RCWiFi Wireless Internet Service
:for i from=10 to=100 do={/queue simple add
MAC Address and Blocking
Looking for a script to help Build multiple simple queues at one shot. I got
the one below from the MT forums but it is for V2 and its not working with
V3. Anyone got a good link
Steve Barnes
RCWiFi Wireless Internet Service
:for i from=10 to=100 do={/queue simple add
On Wed, 2009-01-14 at 13:14 -0600, Brian Bearce wrote:
Does it make a difference if these are private IP's 192.168.*.*? These are
NATed via another router.
Private IP/public IP is not relevant. What IS relevant (as others have
stated) is that you run the arp test on the router that is
12 matches
Mail list logo