關閉廣告

那些年我們一起開的搞笑地產公司 五都法拍屋 9月爆量-歪樓篇

XDDDDDDDD wrote:
三角鐵喔以前我都跟...(恕刪)

這就是老來彈吉他的下場



KingDavid520 wrote:
今天一早上山,山下台...(恕刪)



高雄還好


85大樓過馬路就有輕軌


發現加碼海景房實在有點笨

搭個渡輪就有magic time
我覺得烏克麗麗比較可愛
從五年前說要學到現在XDDDDDDDDD

achitsai wrote:
這就是老來彈吉他的...(恕刪)
XDDDDDDDD wrote:
從五年前說要學到現在..(恕刪)

恭喜妳!·····沒有淪落街頭賣藝的可能

像我學了一年多已經可以彈到足以撩情了····喔!不····是聊琴





XDDDDDDDD wrote:
我覺得烏克麗麗比較...(恕刪)


double bass適合你啦
一雙玉臂千人枕、半點朱唇萬客嚐,還君明珠雙淚垂、恨不相逢未嫁時
我對三角鐵或是響板比較有興趣
這兩種應該都不需要到街頭賣藝XDDDDDDDDD

achitsai wrote:
恭喜妳!·····...(恕刪)


有喔
高中時聽搖滾樂就會很想學
然後過陣子又忘記這件事這樣XDDDDDDDD

economic wrote:
double bass...(恕刪)
achitsai wrote:

恭喜妳!·····...(恕刪)







A大在高雄....


我剛剛才從台旅騎車繞愛河回來...


還好沒有被逮到
寶貝:)開心最重要!
茶好了.中繼先不要動.真的.不用重新開機啥都不用.等等就修正一下老祖宗.問題查到了所以.
--
若華碩用梅林的.對不起要修正了.請回刷原廠韌體.抓到梅林的露點.也是暗流已能利用的樁點.
梅林韌體有一個特點.每次重開機都會出現137&138及9999偵測更新.原廠僅9999.
就是137&138被暗流看穿能利用.137&138在ROS是會被打槍的.看起來是很正常.
實際上在進入介面.順暢度沒有比原廠順快.照常理重開機應會比長時間運作還來的順暢略快一些.
就因老祖宗規則被暗流知道不好破加上中華DNS有憑證過濾機制.只好換個方式針對梅林的露點.
還真有給它鑽透.去限制級網站彈跳廣告是憑證不給過而直接攔截.中繼韌體有沒有寫好或被穿透.
有沒有被穿破只要去一趟限制級網站就知道囉.我印象中番茄沒過.原廠韌體要勤升新版才能倖免.
或者親自登入中繼AP看一下就知道.這就是寄生AP利用137&138埠來達成類似旁側監聽.
只要有他們的通路.隨便一個網站比方限制級網站.對比吻合就直接從中繼AP進來植入暗樁廣告.
前陣子用梅林是沒有發生過.就在當我說中華DNS已經有過濾憑證.暗流知道後就認知憑證沒過.
過去他們只需要透過該限制級網站彈跳廣告顯示該站的廣告就夠了.因暗流總有辦法利用樁來知道.
就在中華DNS已有憑證過濾機制後.暗流就發現不妙.於是就趕緊把梅林的能鑽的漏洞給它研究.
還真的給它研究到了.可能就是那個137&138埠.原廠一重新開機會偵測所以顯示9999.
9999在ROS是不會通的.137&138&9999埠這是梅林重開機就會有三埠先出去的.
就是剛好這點能被利用.所以我評估說應是137&138被鑽.所以在這裡要特別提醒用華碩的.
至於番茄有沒有過.印象中看晶片與規則.前篇的老祖宗鋼鐵堅強版規則搭配原廠韌體順暢已完穩.
意思是說暗流知道我更動規則發布後.就馬上著手針對梅林.還真的給它針對找到.這次新的問題.
就在中繼.ROS主路由規則沒有影響.建議中繼韌體更改回到原廠韌體.能換盡量換回原廠韌體.
若是中繼刷番茄.晶片不要太舊就行了.至少要2011年開始起跳的機種.穩穩順用就沒問題了.
暗流也很聰明.看到我這篇後.訊號起伏又開始落差.但還是很穩定.此時就是說暗流看到這篇文.
就開始劈哩啪啦.透過鄰近寄生AP.開始玩訊號打擊.這次結果是很穩定.通常在無線的訊號上.
以2.4G說若您有開啟Wi-Fi狀態視窗觀察突然卡在54Mbps一陣子有的話.這是異常.
這就是已經穿透的現象與徵兆.除非您是全程用G(54Mbps).否則這是很罕見幾乎是異常.
中繼設定.還是一樣沒啥變.只需要改RTS值為256就行了.其餘不用費心.因ROS規則在.
只要ROS主路由規則寫得好.其餘啥都跟著好.這是連鎖論.也是起頭對過程就順結果是對之論.
梅林掰掰.謝謝讓我知道問題的源由.若沒有梅林.或許事情演變就不會這麼有趣.
--
寶貝:)留言囉.好了.我任務完成了.這下暗流會很忙.忙著開始鑽漏洞囉.九成九機率鑽中繼.
嘻嘻.從這裡就能知道說.若撇去中繼AP.ROS仍能自保持它的穩定性.完全不影響到ROS.
此時ROS的定位就更明朗.它只需顧好它自己就好.這才是正確的.讓網路保持連線是它的本分.
就算出現豬隊友.或是拖油瓶.它還是它.就是因為暗流知道老祖宗鋼鐵堅硬版很硬根本沒辦法搞.
就只好搞中繼.這次看要搞哪裡?我看還是中繼.唯一能有破綻的也仍是中繼.梅林這件事僅在樁.
01也慢慢地在改變.廣告也有努力做篩選.像是每禮拜五六七是暗流暗樁廣告放風日.算算時間.
放風時間若沒記錯的話應是禮拜五的十二點開始到禮拜七的十二點結束.這是廣告暗樁放風的週期.
所以僅兩天.這有個好處就是可以慢慢修正.利用放風日來去修正應對.若非放風日出現暗樁廣告.
這時候有兩種可能.就是裝置可能有中獎.這是第一種.另一種是之前提到的歪壞頻道.這第二種.
上述前者是比較廣.後者比較狹.前者很廣就表示有很多可能性.電腦中毒阿或網設及中繼出問題.
最後結論就是ROS採用鋼鐵堅硬版有個好處.裝置不幸是豬隊友.ROS功能不變仍然正常運作.
這裡的觀念就類似彩虹橋.當索爾說要傳送時.它就傳送了.ROS功能如彩虹橋.這樣想就好了.
--
更正.梅林先繼續用.問題我還在抓查抓查.很湊巧是梅林作者又發佈了新版.384.4_2版.
啊哈.我懂了.只要有先上去限制級網站.第一次它會先記錄.第二次來時暗樁就會出現暗樁廣告.
無關ROS.只是說若您中繼有重啟或是重開過.沒事別去限制級網站就沒這廣告暗樁存在的問題.
以我的例子是第一次上去.若是暗樁沒記住中繼.來過這次就被記住了.再次去就會看到暗樁廣告.
所以為了避開這問題.中繼建議重啟.除非又在上一次.暗樁就記住您中繼.這有很大的麻煩缺點.
所以梅林沒事了.其實原廠也會.只是原廠最新版的真的用起來很順快又較穩定.原因我還在查查.
--
Tupac - Hail Mary
寶貝:)開心最重要!
老祖宗應對暗流修正.紅框打掉換紫框.不過這次我改回像樣一點的.這樣就行了.
add action=accept chain=input comment=\
"Accept established and related packets" connection-state=\
established,related connection-nat-state=!srcnat
add action=accept chain=input comment="From our LAN" in-interface=bridge \
connection-state=established,related,new connection-nat-state=!dstnat \
src-address-list=LAN

add action=accept chain=forward comment=\
"Accept all New Packets connections from network" connection-state=new \
in-interface=bridge src-address-list=LAN connection-nat-state=!dstnat

add action=accept chain=input comment=\
"Accept established and related packets" connection-state=\
established,related
add action=accept chain=input comment="From our LAN" \
connection-state=new connection-nat-state=!dstnat src-address-list=LAN
add action=accept chain=forward comment=\
"Accept all New Packets connections from network" connection-state=new \
src-address-list=LAN connection-nat-state=!dstnat
NeverGiveUp!! wrote:
好了.中繼先不要動.真的.不用重新開機啥都不用.等等就修正一下老祖宗.問題查到了所以.
/ip firewall address-list
add address=192.168.88.2-192.168.88.254 list=LAN
/ip firewall nat
add action=redirect chain=dstnat comment=DNS dst-port=53 protocol=tcp \
to-ports=53
add action=redirect chain=dstnat dst-port=53 protocol=udp to-ports=53
add action=masquerade chain=srcnat comment="IP Masquerading" \
src-address-list=LAN
/ip firewall filter
add action=reject chain=forward dst-port=53,443 log=yes protocol=udp \
reject-with=icmp-network-unreachable src-address-list=LAN log-prefix=\
Reject LAN -> UDP(53,443)
add action=accept chain=input comment=\
"Accept established and related packets" connection-state=\
established,related
add action=accept chain=input comment=udp limit=1/365d,0:packet protocol=udp
add action=accept chain=input comment="From our LAN" \
connection-state=new connection-nat-state=!dstnat src-address-list=LAN
add action=accept chain=input comment="Allow limited pings" icmp-options=\
!8:0-255 limit=50/5s,2:packet protocol=icmp
add action=reject chain=input comment="Reject login brute forcers 1" dst-port=\
21,22,23,8291 log=yes protocol=tcp reject-with=icmp-network-unreachable \
src-address-list=login_blacklist
add action=add-src-to-address-list address-list=login_blacklist \
address-list-timeout=4d chain=input comment="Reject login brute forcers 2" \
connection-state=new dst-port=21,22,23,8291 protocol=tcp
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment=\
"Reject port scanners\A1GPort scanners to list" log=yes protocol=tcp psd=\
21,3s,3,1
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP FIN Stealth scan" log=\
yes protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/FIN scan" log=yes \
protocol=tcp tcp-flags=fin,syn
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/RST scan" log=yes \
protocol=tcp tcp-flags=syn,rst
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="FIN/PSH/URG scan" log=yes \
protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="ALL/ALL scan" log=yes \
protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP NULL scan" log=yes \
protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
add action=reject chain=input comment="dropping port scanners" log=yes \
reject-with=icmp-network-unreachable src-address-list="port scanners"
add action=accept chain=forward comment="Established, Related" \
connection-state=established,relatedadd connection-nat-state=!dstnat
add action=accept chain=forward comment=\
"Accept all New Packets connections from network" connection-state=new \
src-address-list=LAN connection-nat-state=!dstnat
add action=reject chain=forward comment="Reject All Forward Packets" log=no \
log-prefix="Reject All Packets" reject-with=icmp-network-unreachabl
add action=log chain=input comment="Log everything else" log-prefix=\
"REJECT INPUT"
add action=reject chain=input comment="Reject everything else" reject-with=\
icmp-network-unreachable
/system scheduler
add comment="Check and set NTP servers" interval=6h name=SetNtpServers \
on-event="# SetNtpServers - Check and set NTP servers from NTP pool\\

# v1.2 Tested and Developed on ROS v5.7\\

#\\

# Change the following line as needed as progName should match script na\\
me \\

:local progName \\"SetNtpServers\";\

\

# Array of NTP pools to use (check www.pool.ntp.org) one or a maximum of\
\_two, a primary & secondary\

# Modify the following line and array variable based on your locale (def\
ault is north america).\

:local arrNtpSystems (\"taiwan.pool.ntp.org\", \"asia.pool.ntp.org\");\

# Alternatively the US related pool below can be used. \

#:local arrNtpSystems (\"taiwan.pool.ntp.org\", \"asia.pool.ntp.org\");\

#\

# No modification is necessary beyond this line.\

:put \"\$progName: Running...\";\

:log info \"\$progName: Running...\";\

:set arrNtpSystems [ :toarray \$arrNtpSystems ];\

:if (( [ :len \$arrNtpSystems ] < 1 ) or ( [ :len \$arrNtpSystems ] > 2 \
)) do={ \

:put \"\$progName: ERROR NTP Systems array (\\\$arrNtpSystems) must \
be either one or two DNS names.\";\

:log info \"\$progName: ERROR NTP Systems array (\\\$arrNtpSystems) \
must be either one or two DNS names.\";\

} else={\

:local arrRosNtpSetting (\"primary-ntp\", \"secondary-ntp\");\

:local i 0;\

:foreach strNtpSystem in (\$arrNtpSystems) do={\

:local ipAddrNtpSystem [ :resolve \$strNtpSystem ];\

:local strRosNtpSetting [ :pick \$arrRosNtpSetting \$i ];\

:local strCurrentNtpIp [ /system ntp client get \$strRosNtpSetti\
ng ];\

:put \"\$progName: NTP server DNS name \$strNtpSystem resolves t\
o \$ipAddrNtpSystem.\";\

:log info \"\$progName: NTP server DNS name \$strNtpSystem resol\
ves to \$ipAddrNtpSystem.\";\

:put \"\$progName: Current \$strRosNtpSetting setting is \$strCu\
rrentNtpIp.\";\

:log info \"\$progName: Current \$strRosNtpSetting setting is \$\
strCurrentNtpIp.\";\

:if ( [ :toip \$ipAddrNtpSystem ] != [ :toip \$strCurrentNtpIp ]\
\_) do={\

:put \"\$progName: Changing \$strRosNtpSetting setting to \$\
ipAddrNtpSystem.\";\

:log info \"\$progName: Changing \$strRosNtpSetting setting \
to \$ipAddrNtpSystem.\";\

:local strCommand [ :parse \"/system ntp client set \$strRos\
NtpSetting=\\\"\$ipAddrNtpSystem\\\"\" ];\

\$strCommand;\

} else={\

:put \"\$progName: No changes were made for the \$strRosNtpS\
etting NTP setting.\";\

:log info \"\$progName: No changes were made for the \$strRo\
sNtpSetting NTP setting.\";\

}\

:set i (\$i + 1);\

}\

}\

:put \"\$progName: Done.\";\

:log info \"\$progName: Done.\";" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
add comment=Download_Ads_List interval=24h name=DownloadAdsList \
on-event="/system script run Blocklister_download_Ads" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
add interval=25h name=DownloadSpywareList on-event=\
"/system script run Blocklister_download_Spyware" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
add interval=26h name=DownloadMalwaredomainlistList on-event=\
"/system script run Blocklister_download_Malwaredomainlist" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
add interval=27h name=DownloadHijackedList on-event=\
"/system script run \

Blocklister_download_Hijacked" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
/system script
add name=Blocklister_download_Ads owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\\
tool fetch url=\\"https://blocklister.gefoo.org/ads\" dst-path=\"ads.rsc\";\
\_/import file-name=\"ads.rsc\";"
add name=Blocklister_download_Spyware owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\\
tool fetch url=\\"https://blocklister.gefoo.org/spyware\" dst-path=\"spywar\
e.rsc\"; /import file-name=\"spyware.rsc\";"
add name=Blocklister_download_Malwaredomainlist owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\\
tool fetch url=\\"https://blocklister.gefoo.org/malwaredomainlist\" dst-pat\
h=\"malwaredomainlist.rsc\"; /import file-name=\"malwaredomainlist.rsc\";"
add name=Blocklister_download_Hijacked owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\\
tool fetch url=\\"https://blocklister.gefoo.org/hijacked\" dst-path=\"hijac\
ked.rsc\"; /import file-name=\"hijacked.rsc\";"
/ip firewall raw
add action=drop chain=prerouting dst-address-list=ads_list log=yes
add action=drop chain=prerouting comment="Drop Spyware" dst-address-list=\
spyware_list log=yes
add action=drop chain=prerouting dst-address-list=hijacked_list log=yes
add action=drop chain=prerouting dst-address-list=malwaredomainlist_list \
log=yes
add action=drop chain=prerouting src-address-list=port scanners log=yes
add action=drop chain=prerouting src-address-list=login_blacklist log=yes
add action=drop chain=prerouting comment="Block Teredo IPv6-tunnel" dst-port=\
3544,3545 protocol=udp src-port=1024-65535
--
寶貝:)幸好及時處理解決了.不過很奇怪欸.算了.規則有貼進去到就好.沒事.一切都是誤會.
幸好美麗的誤會.才能及時把老祖宗修好.就這樣.因為在修的過程.測試暗樁廣告.直到沒出現.
因為有CNS那條罩.乾脆全部通通都隱蔽.故把in-interface=bridge拿掉.
這次就沒問題.一次堵掉它.啥事都很有安全感.至於剛剛中繼梅林的誤會.我對作者說聲對不起.
幸好這次完成它.無線歪壞反而更穩定了.嘻嘻.下次我會注意一下修正規則時確保有沒有帶進來.
這次就完穩的像樣.可以用很久.好囉.最後完成了.雖然結尾坐收有點不太帥帥的.但任務完成.
--
Life Goes On - Tupac
寶貝:)開心最重要!

蜜小雪 wrote:
A大在高雄.......(恕刪)

制高點監看完Y大後輪到妳



關閉廣告
文章分享
評分
評分
複製連結
請輸入您要前往的頁數(1 ~ 9059)

今日熱門文章 網友點擊推薦!