Discussion in 'Tomato Firmware' started by rats12345, Feb 17, 2008.
Can you all help me to slove the problem?
I wonder what it looked like before the edit. :\
Maybe a bit more information and a few less bangs!!!!!!!!!!!!
I am sorry.I can not write in English :frown:very good
Here is some information
Anybody can google for netcut but it won't bring them any closer to what your problem is.
So, what is your problem? Are you trying to use netcut and it isn't working as expected or is someone using netcut on you and it is working?
Someone using netcut and Tomato can not stop it.:smile:
I would like to know how to stop it.
do you have the IP/MAC address of the user that is running NETCUT? if so block his IP or MAC
Netcut poisions ARP. Who's ARP is bieng poisioned? Your ARP or the router's?
Find the culprit and take them out behind the woodshed. Deny them access to the router.
I told my cilents to use firewall to protect themself, But my router still being poison.
Can I slove the problem by using Tomato?
I using DHCP
"High intimate ure ARP protocol kernel.enhenced cut off funcation, that no one can escape from your cut off unless he have netcut installed and with protected funcation enabled."The develop the program said. -___-
you are now not making any sense. maybe your english is not the best but STOP and LISTEN to the help you are given.
I suggest you stop ALL clients from having access to your router.
If you are the Admin of the router that is affected, then you have the right to stop everyone from using access via your router. until they offending user stops his attack.
You do not have to keep saying HELP every post.
you have been told what to do, now do it.
It's child's play to stop the client from ARP poision attacks and Google is your friend there. If the router's ARP cache is being poisioned, it is not as trivial and your best defense there is to hunt down the offender.
You still have not said whether it is the client or the router being attacked so there is not much more advice we can give. You also haven't said whether the router is under your control.
1) Disable ICMP
2) arp -d * //In case you are already poisoned
3) enable MAC filtering on your router!
4) Finally add a static ARP table
Thanks you for helping:redface: