默认ros安装好以后,可能对外开放的端口号,可能被黑客利用的地方,ros的0day漏洞


下面用红色注明的地方,可以让黑客识别出你是否是ROS设备的端口

ip-service:

api 8728

api-ssl 8729

ftp 21

ssh 22

telnet 23

winbox 8291

www 80

www-ssl 443

ppp-sstp-server 443

ip dns -udp 53

ppp-pptp tcp 1723

ppp-l2tp udp 500 4500 1701

ppp-ovpn 1194

tools -BTest Server 监听2000端口

ip-socks 如果被开启enabled,那么很可能被黑客入侵了。

ip Web Proxy 默认开启8080端口

ip firewall nat你做端口映射别人也可以扫描到

 

使用nmap可以把端口扫描出来,用-A可以识别出你是否是ROS设备

 

NMAP基本用法:

参考链接:https://blog.csdn.net/qq_41880069/article/details/82792896

ros的0day漏洞需要用到的工具

nmap,python3.5以上版本,WinboxPoC-master.rar(python脚本)

https://files.cnblogs.com/files/itfat/WinboxPoC-master.rar

对付0day漏洞,首要的就是把ros升级到6.42以上版本。

其次如果你升级不了的话,可以使用我之前的文章,用二次碰撞来防御

https://www.cnblogs.com/itfat/p/12815406.html

或者用下面的防护脚本,但是你的ROS如果对外提供服务,那么需要提前开放端口

禁止端口扫描的安全防护策略
PSD(port scan detection)

/ip firewall filter
add chain=input protocol=tcp psd=21,3s,3,1 action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="Port scanners to list" disabled=no
add chain=input protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="NMAP FIN Stealth scan"
add chain=input protocol=tcp tcp-flags=fin,syn action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="SYN/FIN scan"
add chain=input protocol=tcp tcp-flags=syn,rst action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="SYN/RST scan"
add chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="FIN/PSH/URG scan"
add chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="ALL/ALL scan"
add chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="NMAP NULL scan"
add chain=input src-address-list="port scanners" action=drop comment="dropping port scanners" disabled=no

或者禁止黑客下载你ROS的用户名和密码文件

#Mikrotik 0day
/ip firewall filter
add action=reject chain=input comment="SECURITY _0day" content=user.dat \
disabled=yes reject-with=icmp-network-unreachable
add action=drop chain=input content=user.dat disabled=yes


免责声明!

本站转载的文章为个人学习借鉴使用,本站对版权不负任何法律责任。如果侵犯了您的隐私权益,请联系本站邮箱yoyou2525@163.com删除。



 
粤ICP备18138465号  © 2018-2025 CODEPRJ.COM