07-23-2014
Well, it wouldn't be hanging if it wasn't connecting.
For what purpose are you brute-force-scanning all these ports?
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi there, I've an stupid question. If I make a telnet to a server from my computer and then execute a command that starts an application (on the server), when I disconnect, the application stops running, which is pretty obvious. Is it possible to add a flag at the end of the command so when I cut... (4 Replies)
Discussion started by: piltrafa
4 Replies
2. Programming
Hi Folks
I am not a c programmer .But i need help in writing a program which can do this any ideas on how to go about it .
i start a server on the target server where files need to be copied
start-server -port 5006 & ---start the server and listen it on a partcular port
on the source... (2 Replies)
Discussion started by: linuxdba
2 Replies
3. UNIX for Advanced & Expert Users
I'd like to do a data transfer without encryption but with a guarantee that my data comes from a legit source. I'm thinking something that uses a public key scheme to sign the data.
Does anyone know of something like that?
Thanks!
-Pileofrogs (1 Reply)
Discussion started by: pileofrogs
1 Replies
4. Shell Programming and Scripting
Is there a way how to react on the message a client sent to the server?
I would like as the client sent message to server: "get information such and such" and server would answer.
Thank you for reply! (6 Replies)
Discussion started by: MartyIX
6 Replies
5. Solaris
hello guys, i want to install netcat on my solaris. after i tar and gunzip netcat i'm confuse what do i must to do ? please help me to install netcat on my solaris. I'm beginner :( (2 Replies)
Discussion started by: praset
2 Replies
6. Linux
Hello,
Thank you very much for the line nc -lp <port> . I tried to run simple chat session with nc as it's shown in catonmatDOTorg but failed miserably with that syntax inspite of opening port 7777 by iptables . But your command example is working nicely.
So a bagful of thanks :))
Only one... (0 Replies)
Discussion started by: vectrum
0 Replies
7. Shell Programming and Scripting
Hi;
I have a url like
http://localhost:8080/examples/jsp/dates/nextPageToPost.jsp?name=ajay&password=pas&sex=Male&check=on&nationality=USA&description=aa&submit=submit
in which i want to use nc for http post for parameters like "name","password"....etc
can neone please help me how to do that... (3 Replies)
Discussion started by: ajaypadvi
3 Replies
8. IP Networking
Hi all,
I know my question is regarding Windows and not Linux, but I simply need people who know Netcat pretty well and I'm guessing here is a good place for that. So on with my question.
I'm doing some research, and I was playing around with netcat on a WinXP VM but I can't seem to get... (0 Replies)
Discussion started by: MrCrumbs
0 Replies
9. Shell Programming and Scripting
Hi
Need help to connect from Ubuntu to Windows using NetCat nc
I can not get my script to send new-line
Her is what I have tried(sleep 2 ; echo user ; sleep 1; echo pass; sleep 2; echo netstat) | nc -t 10.10.10.34 23
gives this outputÿý%ÿûÿûÿý'ÿýÿýÿûWelcome to Microsoft Telnet Service
... (1 Reply)
Discussion started by: Jotne
1 Replies
10. Emergency UNIX and Linux Support
Dear Linux guru's
I am trying to create a webserver using nc (netcat only) on RHEL 7.2 running on bash shell.
now the easy thing is to get nc listing to a port and respond back
$ while true; do { echo -e 'HTTP/1.0 200 OK\r\n'; set; } | nc -l 7877; done
This when called from a... (3 Replies)
Discussion started by: chakrapani
3 Replies
LEARN ABOUT CENTOS
fail2ban
FAIL2BAN(1) General Commands Manual FAIL2BAN(1)
NAME
fail2ban - a set of server and client programs to limit brute force authentication attempts.
DESCRIPTION
Fail2Ban consists of a client, server and configuration files to limit brute force authentication attempts.
The server program fail2ban-server is responsible for monitoring log files and issuing ban/unban commands. It gets configured through a
simple protocol by fail2ban-client, which can also read configuration files and issue corresponding configuration commands to the server.
For details on the configuration of fail2ban see the jail.conf(5) manual page. A jail (as specified in jail.conf) couples filters and
actions definitions for any given list of files to get monitored.
For details on the command-line options of fail2ban-server see the fail2ban-server(1) manual page.
For details on the command-line options and commands for configuring the server via fail2ban-client see the fail2ban-client(1) manual page.
For testing regular expressions specified in a filter using the fail2ban-regex program may be of use and its manual page is fail2ban-
regex(1).
LIMITATION
Fail2Ban is able to reduce the rate of incorrect authentications attempts however it cannot eliminate the risk that weak authentication
presents. Configure services to use only two factor or public/private authentication mechanisms if you really want to protect services.
A local user is able to inject messages into syslog and using a Fail2Ban jail that reads from syslog, they can effectively trigger a DoS
attack against any IP. Know this risk and configure Fail2Ban/grant shell access accordingly.
FILES
/etc/fail2ban/*
AUTHOR
Manual page written by Daniel Black and Yaroslav Halchenko
REPORTING BUGS
Report bugs to https://github.com/fail2ban/fail2ban/issues
COPYRIGHT
Copyright (C) 2013
Copyright of modifications held by their respective authors. Licensed under the GNU General Public License v2 (GPL).
SEE ALSO
fail2ban-server(1) fail2ban-client(1) fail2ban-regex(1) jail.conf(5)
Fail2Ban March 2013 FAIL2BAN(1)