Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Router Credential hackers Keylogger

    Scheduled Pinned Locked Moved Firewalling
    29 Posts 6 Posters 2.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      smoses @RobbieTT
      last edited by smoses

      @RobbieTT Your post is gross and has sexual content in it. I don't appreciate it. I wish there was a thumbs down icon. It makes sense. When you get a cell phone activated, it uses your SSN. They're instantly hacked. There is no mistake. I make perfect sense. The pictures because I've had to use them, are infected and turn my formatted brand new USB's into rubber duckies. I was asking about the router hackers which are also black hat. Google it. The "rubber fetish" is your own sick pleasure and unnecessary. I'm being stalked while you're sexually gratifying your own perverted sense. I'm serious and I have pictures of it. If I had money to burn, I'd happily pay but pfsense recommends their forums. I thought I would give it a try.
      To those who answered without pervert comments, THANK YOU.

      R 2 Replies Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance
        last edited by

        @smoses The best advice anyone here can give and the one i gave above is to take your infected devices off the network. Unplug them. reformat the hard drive if you must.
        Firewalls arent magic boxes that can solve all cyber security problems. They absolutely help but at the end of the day the best defense is you. You know you have problematic devices on the network. You need to take them offline until you can solve the problem.

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        S 1 Reply Last reply Reply Quote 2
        • R
          rcoleman-netgate Netgate @smoses
          last edited by

          This post is deleted!
          S 1 Reply Last reply Reply Quote 0
          • S
            smoses @michmoor
            last edited by

            @michmoor I was reviewing the compromised pc article and videos on how to "lock down" the compromised pc. I'd junk it personally. You buy a firewall to make sure you're traffic is clean. I need to create rules and or use a IDS. That's what I was asking about.

            M 1 Reply Last reply Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @smoses
              last edited by

              @smoses said in Router Credential hackers Keylogger:

              You buy a firewall to make sure you're traffic is clean

              No. As i said a firewall isnt a magic box. You think that it is part of the problem here.
              Again, you have a compromised host(s). You don't want to fix it. You want to put an IPS solution around it which doesn't make a lot of sense.
              If you dont want to at least fix the problem but address the fact that your host is infected than im not sure what more any one here in the forums can do. I wish you the best of luck but my advice, to state it again, take the computer off the network. Run virus/malware scans. Best solution is to reformat.

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              R 1 Reply Last reply Reply Quote 1
              • R
                rcoleman-netgate Netgate @michmoor
                last edited by

                @michmoor Agreed. The solution is isolate the infected host and treat.

                Don't burn the entire city to the ground because one resident has a case of measles.

                S 1 Reply Last reply Reply Quote 0
                • S
                  smoses @rcoleman-netgate
                  last edited by

                  @rcoleman-netgate Yep. that follows you also I believe. The comment doesn't state that. It states "rubber fetish". Gun to your head.

                  1 Reply Last reply Reply Quote 0
                  • R
                    rcoleman-netgate Netgate @smoses
                    last edited by

                    @smoses said in Router Credential hackers Keylogger:

                    Your post is gross and has sexual content in it

                    A rubber duckie is a hacking tool.

                    As for their other comment... while it might be a little bit extreme/excessive it is not intended in the manner you are interpreting it.

                    I suggest you ignore any user whose answers you do not like and simply not engage with them.

                    S 1 Reply Last reply Reply Quote 0
                    • S
                      smoses @rcoleman-netgate
                      last edited by

                      @rcoleman-netgate I acknowledged that and posted looking for specifics. Video, articles, etc. I don't need help diagnosing it, just fixing it. If it can. Blocking everything except normal traffic. Egress filtering, whatever.

                      M R 2 Replies Last reply Reply Quote 0
                      • S
                        smoses @rcoleman-netgate
                        last edited by

                        @rcoleman-netgate a rubber fetish is not the same as rubber duckie. With gun to the head, it's completely unnecessary. The user's fault. Not mine.

                        1 Reply Last reply Reply Quote 0
                        • M
                          michmoor LAYER 8 Rebel Alliance @smoses
                          last edited by

                          @smoses
                          Ok...Very well.

                          https://docs.netgate.com/pfsense/en/latest/firewall/index.html#firewall

                          Fantastic documentation can be found at the link above. Everything you need in order to create firewall rules and to isolate hosts if required.

                          I also recommend the following link. Although it shows Snort, the instructions work just as well for Suricata.

                          https://docs.netgate.com/pfsense/en/latest/packages/snort/index.html#ids-ips

                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                          Routing: Juniper, Arista, Cisco
                          Switching: Juniper, Arista, Cisco
                          Wireless: Unifi, Aruba IAP
                          JNCIP,CCNP Enterprise

                          1 Reply Last reply Reply Quote 0
                          • S
                            smoses @SteveITS
                            last edited by smoses

                            @SteveITS for some reason it's affecting the AMD pc more than the Pentium. Completely differently. Specifically, it IS affecting the AMD's bios, registry and files that aren't on the Pentium pc on the same network. Thanks for responding.

                            1 Reply Last reply Reply Quote 0
                            • R
                              rcoleman-netgate Netgate @smoses
                              last edited by

                              @smoses said in Router Credential hackers Keylogger:

                              Blocking everything except normal traffic. Egress filtering, whatever.

                              You're looking, then, for IDS/IPS. Like Snort and Suricata. There's a section of the forum for that, too.

                              S 1 Reply Last reply Reply Quote 0
                              • S
                                smoses @rcoleman-netgate
                                last edited by

                                @rcoleman-netgate That will automatically get rid of the router credentials keylogger and form? The IDS? Is that a guaranteed thing?

                                R 1 Reply Last reply Reply Quote 0
                                • R
                                  rcoleman-netgate Netgate @smoses
                                  last edited by

                                  @smoses Nothing in the world is a guarantee. You said you want to do egress filtering. That's where you should be.

                                  S 1 Reply Last reply Reply Quote 0
                                  • S
                                    smoses @rcoleman-netgate
                                    last edited by

                                    @rcoleman-netgate The only guarantee is to remove the compromised pc completely off the network, right?

                                    R 1 Reply Last reply Reply Quote 0
                                    • R
                                      rcoleman-netgate Netgate @smoses
                                      last edited by

                                      @smoses Yes, like I said earlier...

                                      @rcoleman-netgate said in Router Credential hackers Keylogger:

                                      @michmoor Agreed. The solution is isolate the infected host and treat.

                                      S 1 Reply Last reply Reply Quote 0
                                      • S
                                        smoses @rcoleman-netgate
                                        last edited by

                                        @rcoleman-netgate I only asked as I'm showing it to educate the person who insists on using it. I'm aware of it.

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.