Sponsored Content
Top Forums UNIX for Beginners Questions & Answers Open ports from source to destination Post 303043250 by Neo on Wednesday 22nd of January 2020 10:15:50 AM
Old 01-22-2020
I already provided a link to scanning tools which will do this kind of port scanning.

Please read the posts and review the links and/code we provide you.

You are asking the same question over and over again which we have already answered for you!
 

8 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Byte Rate to/from a source/destination

is there a command in unix/linux that allows you to sample what the historic byte rate is from a local IP to a client IP. (1 Reply)
Discussion started by: cubs0729
1 Replies

2. Shell Programming and Scripting

Count total unique destination for source

Hi, need help how to count unique destination for the source ip. The file is contains 4 number of fields. Example of the file is here src ip dest ip #of flows total bytes 192.168.6.0 88.0.33.2 12 128 192.168.6.0 88.0.33.2 1 168 192.168.6.0 ... (5 Replies)
Discussion started by: new_buddy
5 Replies

3. IP Networking

Selecting interface based on source and destination ip address

Hi all, I have some doubts in selecting the interface to transfer packets and receive the packets. --> Multiple interfaces : -------------------- 1) 0.0.0.0 --------> wild card address. 2) x.x.x.x --------> valid address.(192.168.1.156) 3) ff.ff.ff.ff -------->... (0 Replies)
Discussion started by: vijaypdp2006
0 Replies

4. Shell Programming and Scripting

Move all files from source to destination directory based on the filename

Move all files starting with a specific name to different directory. This shell script program should have three parameters File Name Source Directory Destination Directory User should be able to enter ‘AB_CD*' in file name parameter. In this case all the files starting with AB_CD will... (1 Reply)
Discussion started by: chetancrsp18
1 Replies

5. Linux

rpmbuild, how to specify a different source and destination path for files

I'd like to specify a different build and deployment path for files, by default the same path is used for both build and install, I wasn't able to find a way to make these different. With Solaris pkgadd, one can specify different paths in prototype, so I would assume something like that is possible... (0 Replies)
Discussion started by: tiburblium
0 Replies

6. Solaris

Ftp: SSL_connect error while connecting from source to destination server Solaris 10

Hi Everyone, I am using solaris 10.I am facing a different problem here with tlsftp.I have intalled all steps for tlsftp and able to connect to the destination server from the source server.It worked for some days.But recently when i am connectin it is giving below error.I am... (0 Replies)
Discussion started by: muraliinfy04
0 Replies

7. UNIX for Advanced & Expert Users

Rsync error while running from destination to source

hi All, i have 2 server setup now for Rsync, i configured Rsync on both of the server and it worked well when i did run from source to destination. and while running back from destination to source it produced this error: bash-3.2$ ksh rsync_bravo_db.ksh usa0300uz1247.apps.mc.xerox.com... (0 Replies)
Discussion started by: lovelysethii
0 Replies

8. Shell Programming and Scripting

Count the number of files copied from source to destination location

Hi Guys, how to count number of files successfully copied while coping files from source to destination path ex:10 files from source to target location copying if 8 files copied successfully then echo successfully copied=8 failure=2 files if two files get error to coping files from... (23 Replies)
Discussion started by: sravanreddy
23 Replies
flow-dscan(1)						      General Commands Manual						     flow-dscan(1)

NAME
flow-dscan -- Detect scanning and other suspicious network activity. SYNOPSIS
flow-dscan [-bBhlmpwW] [-d debug_level] [-D iplist_depth] [-s state_file] [-i input_filter] [-L suppress_list] [-o output_filter] [-O excessive_octets] [-P excessive_flows] [-S port_scan_trigger] [-t ager_timeout] DESCRIPTION
The flow-dscan utility is used to detect suspicious activity such as port scanning, host scanning, and flows with unusually high octets or packets. A source and destination suppress list is supported to help prevent false alarms due to hosts such as nameservers or popular web servers that exchange traffic with a large number of hosts. Alarms are logged to syslog or stderr. The internal state of flow-dscan can be saved and loaded to allow for interrupted operation. flow-dscan will work best if configured to only watch only inbound or outbound traffic by using the input or output interface filter option. The host scanner works by counting the length of the destination IP hash chain. If it goes above 64, then the src is considered to be scanning. The port scanner works by keeping a bitmap of the destination port number < 1024 per destination IP. If it goes above 64, the src is con- sidered to be port scanning the destination. When a src has been flagged as scanning it will not be reported again until the record is aged out and enough flows trigger it again. A SIGHUP signal will instruct flow-dscan to reload the suppress list. A SIGUSR1 signal will instruct flow-dscan to dump its internal state. OPTIONS
-b Do not detach and run in the background. Alerts go to stderr. -B Do not detach and run in the background. Alerts go to syslog. -d debug_level Enable debugging. -D iplist_depth Depth of IP host list for detecting host scanning. -h Display help. -i input_filter Input interface filter list. -I output_filter Output interface filter list. -l Load state from /var/tmp/dscan.state or the filename specified with -s. -L suppress_list Basename of suppress files. There are two suppress files for input and output traffic. The suppress file syntax is IP_address protocol source_port destination_port A '-' can be used as a wildcard in the protocol, source_port, and destination_port fields. Only a single protocol, source_port, and destination_port is supported per IP address. -m Multicast address filter. Use to ignore multicast addresses. -O excessive_octets Trigger an alert if a flow is processed with the octets field exceeding excessive_octets. -p Dump state to /var/tmp/dscan.state or the filename specified with -s. -P excessive_packets Trigger an alert if a flow is processed with the packets field exceeding excessive_packets. -s statefile State filename. Defaults to /var/tmp/dscan.state -S port_scan_trigger Number of ports a IP address must have used to be considered scanning. -t ager_timeout How long to keep flows around. Default to 90000. This is measured in flows processed. -T excessive_time Trigger an alert if a flow is processed with the End-Start field exceeding excessive_time. -w Filter (ignore) candidate inbound www traffic, ie IP protocol 6, source port 80, and destination port > 1023. -W Filter (ignore) candidate outbound www traffic, ie IP protocol 6, destination port 80, and source port > 1023. EXAMPLES
In a topology where 25 is the only output interface run flow-dscan over the data in /flows/krc4. Ignore www and multicast traffic, store the internal state in dscan.statefile on exit. Use empty suppress list files dscan.suppress.src and dscan.suppress.dst. The output pro- duced by flow-dscan typically must be manually inspected by using flow-filter and flow-print. Many of the alerts will be false until the suppress lists are populated for the local environment. flow-cat /flows/krc4 | flow-dscan -I25 -b -m -s dscan.statefile -p -W BUGS
The ager should automatically become more aggressive when a low memory condition exists. There is no upper limit on the number of records that can be allocated. If the ager is not running often enough the host will be run out of memory. AUTHOR
Mark Fullmer maf@splintered.net SEE ALSO
flow-tools(1) flow-dscan(1)
All times are GMT -4. The time now is 04:52 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy