I need help due a my silly mistake!
So for long time i have a dedicate server hosted by register.it
Usually i access remotly to this server (Windows 2008 server) by Terminal Server.
Today i wanted to block one site that continually send request to my server.
So i was adding a new rule in the firewall (the native firewall on windows 2008 server), as i did many time, but this time, probably i was sleeping with my brain i add a general rules that stop everything!
So i cant access to the server anymore, as no any users can browse the sites, nothing is working because this rule block everything.
I know that is a silly mistake, no need to tell me 🙂 so please what i can do ?
The only 1 thing that my provider let me is reboot the server by his control panel, but this not help me in any way because the firewall block me again.
i have administrator username and password, so what i really can do ?
there are some trick some tecnique, some expert guru that can help me in this very bad situation ?
i follow the Tony suggest and i did a NMAP to check if some ports are open but look like all closed:
Starting Nmap 6.00 ( http://nmap.org ) at 2012-05-29 22:32 W. Europe Daylight Time NSE: Loaded 93 scripts for scanning. NSE: Script Pre-scanning. Initiating Parallel DNS resolution of 1 host. at 22:32 Completed Parallel DNS resolution of 1 host. at 22:33, 13.00s elapsed Initiating SYN Stealth Scan at 22:33 Scanning xxx.xxx.xxx.xxx [1000 ports] SYN Stealth Scan Timing: About 29.00% done; ETC: 22:34 (0:01:16 remaining) SYN Stealth Scan Timing: About 58.00% done; ETC: 22:34 (0:00:44 remaining) Completed SYN Stealth Scan at 22:34, 104.39s elapsed (1000 total ports) Initiating Service scan at 22:34 Initiating OS detection (try #1) against xxx.xxx.xxx.xxx Retrying OS detection (try #2) against xxx.xxx.xxx.xxx Initiating Traceroute at 22:34 Completed Traceroute at 22:35, 6.27s elapsed Initiating Parallel DNS resolution of 11 hosts. at 22:35 Completed Parallel DNS resolution of 11 hosts. at 22:35, 13.00s elapsed NSE: Script scanning xxx.xxx.xxx.xxx. Initiating NSE at 22:35 Completed NSE at 22:35, 0.00s elapsed Nmap scan report for xxx.xxx.xxx.xxx Host is up. All 1000 scanned ports on xxx.xxx.xxx.xxx are filtered Too many fingerprints match this host to give specific OS details TRACEROUTE (using proto 1/icmp) HOP RTT ADDRESS 1 ... ... ... 13 ... 30 NSE: Script Post-scanning. Read data files from: D:\Program Files\Nmap OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 145.08 seconds Raw packets sent: 2116 (96.576KB) | Rcvd: 61 (4.082KB)
Question: The provider locally can access by username and password ?
Your provider does not provide remote console access to its servers. This means your only option is to request that they reinstall the operating system. Once it is reinstalled, you can restore from your backups.
You may wish to shop for another server provider who offers remote console access to their servers.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.