Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Router Credential hackers Keylogger

    Scheduled Pinned Locked Moved Firewalling
    29 Posts 6 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance
      last edited by

      @smoses The best advice anyone here can give and the one i gave above is to take your infected devices off the network. Unplug them. reformat the hard drive if you must.
      Firewalls arent magic boxes that can solve all cyber security problems. They absolutely help but at the end of the day the best defense is you. You know you have problematic devices on the network. You need to take them offline until you can solve the problem.

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      S 1 Reply Last reply Reply Quote 2
      • R
        rcoleman-netgate Netgate @smoses
        last edited by

        This post is deleted!
        S 1 Reply Last reply Reply Quote 0
        • S
          smoses @michmoor
          last edited by

          @michmoor I was reviewing the compromised pc article and videos on how to "lock down" the compromised pc. I'd junk it personally. You buy a firewall to make sure you're traffic is clean. I need to create rules and or use a IDS. That's what I was asking about.

          M 1 Reply Last reply Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @smoses
            last edited by

            @smoses said in Router Credential hackers Keylogger:

            You buy a firewall to make sure you're traffic is clean

            No. As i said a firewall isnt a magic box. You think that it is part of the problem here.
            Again, you have a compromised host(s). You don't want to fix it. You want to put an IPS solution around it which doesn't make a lot of sense.
            If you dont want to at least fix the problem but address the fact that your host is infected than im not sure what more any one here in the forums can do. I wish you the best of luck but my advice, to state it again, take the computer off the network. Run virus/malware scans. Best solution is to reformat.

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            R 1 Reply Last reply Reply Quote 1
            • R
              rcoleman-netgate Netgate @michmoor
              last edited by

              @michmoor Agreed. The solution is isolate the infected host and treat.

              Don't burn the entire city to the ground because one resident has a case of measles.

              S 1 Reply Last reply Reply Quote 0
              • S
                smoses @rcoleman-netgate
                last edited by

                @rcoleman-netgate Yep. that follows you also I believe. The comment doesn't state that. It states "rubber fetish". Gun to your head.

                1 Reply Last reply Reply Quote 0
                • R
                  rcoleman-netgate Netgate @smoses
                  last edited by

                  @smoses said in Router Credential hackers Keylogger:

                  Your post is gross and has sexual content in it

                  A rubber duckie is a hacking tool.

                  As for their other comment... while it might be a little bit extreme/excessive it is not intended in the manner you are interpreting it.

                  I suggest you ignore any user whose answers you do not like and simply not engage with them.

                  S 1 Reply Last reply Reply Quote 0
                  • S
                    smoses @rcoleman-netgate
                    last edited by

                    @rcoleman-netgate I acknowledged that and posted looking for specifics. Video, articles, etc. I don't need help diagnosing it, just fixing it. If it can. Blocking everything except normal traffic. Egress filtering, whatever.

                    M R 2 Replies Last reply Reply Quote 0
                    • S
                      smoses @rcoleman-netgate
                      last edited by

                      @rcoleman-netgate a rubber fetish is not the same as rubber duckie. With gun to the head, it's completely unnecessary. The user's fault. Not mine.

                      1 Reply Last reply Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @smoses
                        last edited by

                        @smoses
                        Ok...Very well.

                        https://docs.netgate.com/pfsense/en/latest/firewall/index.html#firewall

                        Fantastic documentation can be found at the link above. Everything you need in order to create firewall rules and to isolate hosts if required.

                        I also recommend the following link. Although it shows Snort, the instructions work just as well for Suricata.

                        https://docs.netgate.com/pfsense/en/latest/packages/snort/index.html#ids-ips

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        1 Reply Last reply Reply Quote 0
                        • S
                          smoses @SteveITS
                          last edited by smoses

                          @SteveITS for some reason it's affecting the AMD pc more than the Pentium. Completely differently. Specifically, it IS affecting the AMD's bios, registry and files that aren't on the Pentium pc on the same network. Thanks for responding.

                          1 Reply Last reply Reply Quote 0
                          • R
                            rcoleman-netgate Netgate @smoses
                            last edited by

                            @smoses said in Router Credential hackers Keylogger:

                            Blocking everything except normal traffic. Egress filtering, whatever.

                            You're looking, then, for IDS/IPS. Like Snort and Suricata. There's a section of the forum for that, too.

                            S 1 Reply Last reply Reply Quote 0
                            • S
                              smoses @rcoleman-netgate
                              last edited by

                              @rcoleman-netgate That will automatically get rid of the router credentials keylogger and form? The IDS? Is that a guaranteed thing?

                              R 1 Reply Last reply Reply Quote 0
                              • R
                                rcoleman-netgate Netgate @smoses
                                last edited by

                                @smoses Nothing in the world is a guarantee. You said you want to do egress filtering. That's where you should be.

                                S 1 Reply Last reply Reply Quote 0
                                • S
                                  smoses @rcoleman-netgate
                                  last edited by

                                  @rcoleman-netgate The only guarantee is to remove the compromised pc completely off the network, right?

                                  R 1 Reply Last reply Reply Quote 0
                                  • R
                                    rcoleman-netgate Netgate @smoses
                                    last edited by

                                    @smoses Yes, like I said earlier...

                                    @rcoleman-netgate said in Router Credential hackers Keylogger:

                                    @michmoor Agreed. The solution is isolate the infected host and treat.

                                    S 1 Reply Last reply Reply Quote 0
                                    • S
                                      smoses @rcoleman-netgate
                                      last edited by

                                      @rcoleman-netgate I only asked as I'm showing it to educate the person who insists on using it. I'm aware of it.

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.