Sponsored Content
Top Forums UNIX for Advanced & Expert Users check inbound traffic on ports Post 17606 by sunoracle on Monday 18th of March 2002 01:52:16 PM
Old 03-18-2002
check inbound traffic on ports

Hello,

I'm new to the forum and would like to know how to check
inbound traffic on various port numbers.

I would also like to know how to open and close various ports
on a unix box running solaris 8.

Thanks in advance.

sunoracle
 

9 More Discussions You Might Find Interesting

1. IP Networking

check inbound traffic on ports

Hello, I'm new to the forum and would like to know how to check inbound traffic on various port numbers. I would also like to know how to open and close various ports on a unix box running solaris 8. Thanks in advance. sunoracle (2 Replies)
Discussion started by: sunoracle
2 Replies

2. Shell Programming and Scripting

Processing inbound mail

Hi All Has anyone written any script that would listen for inbound mail and based on its subject process the body ? Thx J (3 Replies)
Discussion started by: jhansrod
3 Replies

3. Shell Programming and Scripting

Check open ports every ...

Hello, i need a script (bash type maybe?..), which would check open ports on 127.0.0.1 and then compare open ports with "registered/allowed" port list and try to kill the program who uses unregistered ports. It would be great that script would be started lets say every 5 or 10 minutes. You see i... (2 Replies)
Discussion started by: MorchiuS
2 Replies

4. Shell Programming and Scripting

Script to automatically check ports in shell?

Good day, I'm new to linux environment...Is there any scripts available for me to check ports (lets say port 80 and 21) through shell with just a single commandline? Any response is very much appreciated.. thanks (4 Replies)
Discussion started by: arsonist
4 Replies

5. Cybersecurity

check ports on server

Hi All, I've been using this to verify if ports is open on a server. For example I would like to check port 5887, "telnet ip.of.server 5887" using on dos. If there's response on it then I can say it's open, if not then it's close. Is that assumption accurate? Thanks for any comments you... (4 Replies)
Discussion started by: itik
4 Replies

6. Solaris

Solaris Question - How to find outgoing traffic on UDP ports

Hello All, I am trying find a command that would show me the stats of outgoing traffic on UPD ports on a Solaris 10 box. I would appreciate if anybody could help me out on this. Thank you much!!! Best Regards Sudharma. (7 Replies)
Discussion started by: sudharma
7 Replies

7. Shell Programming and Scripting

Script to check numerous ports / servers (Solaris native)

Hi I'd like to check that a bunch of firewall rules have been applied and, therefore, want to write a script that basically does the following: telnet serverA port1 telnet serverA port2 telnet serverB port1 telnet serverB port2 I would just compile the list in excel and run it as a... (2 Replies)
Discussion started by: jibberish
2 Replies

8. AIX

How to check that rpcbind/portmap on AIX allowes updates from non privileged ports?

Hi, I am trying to implement a service on AIX based on ONCRPC protocal and I want to use a RPC library called oncrpc4j because it is a non-blocked i/o library. I found it works fine on my work machine (WIndows 7) but failed on my AIX work station. The author of oncrpc4j told me that check that... (1 Reply)
Discussion started by: derekhsu
1 Replies

9. Shell Programming and Scripting

Check unused ports in a given range and assign an open one

Hi. I need to add code to my KSH script to automatically assign an open port number from a pre-defined range to an Oracle listener. Should I use: lsof -i or netstat -vatn or something else? Thanks. (9 Replies)
Discussion started by: user052009
9 Replies
flow-dscan(1)						      General Commands Manual						     flow-dscan(1)

NAME
flow-dscan -- Detect scanning and other suspicious network activity. SYNOPSIS
flow-dscan [-bBhlmpwW] [-d debug_level] [-D iplist_depth] [-s state_file] [-i input_filter] [-L suppress_list] [-o output_filter] [-O excessive_octets] [-P excessive_flows] [-S port_scan_trigger] [-t ager_timeout] DESCRIPTION
The flow-dscan utility is used to detect suspicious activity such as port scanning, host scanning, and flows with unusually high octets or packets. A source and destination suppress list is supported to help prevent false alarms due to hosts such as nameservers or popular web servers that exchange traffic with a large number of hosts. Alarms are logged to syslog or stderr. The internal state of flow-dscan can be saved and loaded to allow for interrupted operation. flow-dscan will work best if configured to only watch only inbound or outbound traffic by using the input or output interface filter option. The host scanner works by counting the length of the destination IP hash chain. If it goes above 64, then the src is considered to be scanning. The port scanner works by keeping a bitmap of the destination port number < 1024 per destination IP. If it goes above 64, the src is con- sidered to be port scanning the destination. When a src has been flagged as scanning it will not be reported again until the record is aged out and enough flows trigger it again. A SIGHUP signal will instruct flow-dscan to reload the suppress list. A SIGUSR1 signal will instruct flow-dscan to dump its internal state. OPTIONS
-b Do not detach and run in the background. Alerts go to stderr. -B Do not detach and run in the background. Alerts go to syslog. -d debug_level Enable debugging. -D iplist_depth Depth of IP host list for detecting host scanning. -h Display help. -i input_filter Input interface filter list. -I output_filter Output interface filter list. -l Load state from /var/tmp/dscan.state or the filename specified with -s. -L suppress_list Basename of suppress files. There are two suppress files for input and output traffic. The suppress file syntax is IP_address protocol source_port destination_port A '-' can be used as a wildcard in the protocol, source_port, and destination_port fields. Only a single protocol, source_port, and destination_port is supported per IP address. -m Multicast address filter. Use to ignore multicast addresses. -O excessive_octets Trigger an alert if a flow is processed with the octets field exceeding excessive_octets. -p Dump state to /var/tmp/dscan.state or the filename specified with -s. -P excessive_packets Trigger an alert if a flow is processed with the packets field exceeding excessive_packets. -s statefile State filename. Defaults to /var/tmp/dscan.state -S port_scan_trigger Number of ports a IP address must have used to be considered scanning. -t ager_timeout How long to keep flows around. Default to 90000. This is measured in flows processed. -T excessive_time Trigger an alert if a flow is processed with the End-Start field exceeding excessive_time. -w Filter (ignore) candidate inbound www traffic, ie IP protocol 6, source port 80, and destination port > 1023. -W Filter (ignore) candidate outbound www traffic, ie IP protocol 6, destination port 80, and source port > 1023. EXAMPLES
In a topology where 25 is the only output interface run flow-dscan over the data in /flows/krc4. Ignore www and multicast traffic, store the internal state in dscan.statefile on exit. Use empty suppress list files dscan.suppress.src and dscan.suppress.dst. The output pro- duced by flow-dscan typically must be manually inspected by using flow-filter and flow-print. Many of the alerts will be false until the suppress lists are populated for the local environment. flow-cat /flows/krc4 | flow-dscan -I25 -b -m -s dscan.statefile -p -W BUGS
The ager should automatically become more aggressive when a low memory condition exists. There is no upper limit on the number of records that can be allocated. If the ager is not running often enough the host will be run out of memory. AUTHOR
Mark Fullmer maf@splintered.net SEE ALSO
flow-tools(1) flow-dscan(1)
All times are GMT -4. The time now is 04:39 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy