Skip to content

Firewall rule did not create, but negotiation was terminated at early stage really #1

@rynetang

Description

@rynetang

I changed the Windows 3389 port through the router to a high value port and exposed it to the public network. I was attacked by brute force password cracking attacks every time. This software really helped. As can be seen from the RDSH 140 incident, password guessing occurred after using RDPBloker stopped, but as can be seen from the RDSH 131 event and Wireshark packet capture, the TCP connection is still established, and the entry that RDPBlocker should have created cannot be found in the Windows Advanced Firewall panel. Fail2ban feature seems not working. It is recommended that these attack sources be added to the firewall blacklist and TCP connections should not be established.

before-rdpblocker
before-rdpblocker
after-rdpblocker-running
after-rdpblocker-running

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions