Buscar en moleculax
Detectando el ataque

Usando el comando netstat

Código:
netstat -an | grep :80 | sort

Código:
netstat -n -p | grep SYN_REC | awk '{print $5}' | awk -F: '{print $1}'

Código:
netstat -n -p|grep SYN_REC | wc -l

Código:
netstat -lpn|grep :80 |awk '{print $5}'|sort

Código:
netstat -an | grep :80 | awk '{ print $5 }' | awk -F: '{ print $1 }' | sort | uniq -c | sort -n



Referencias

- Opciones de seguridad en Linux a través de /proc (I) y (II)
 http://www.elhacker.net/opciones-seguridad-linux-proc.html

- Syctl.conf Hardening
 http://www.eth0.us/sysctl

- Ipsysctl tutorial 1.0.4
http://ipsysctl-tutorial.frozentux.net/ipsysctl-tutorial.html

-  Hardening the TCP/IP stack to SYN attacks
http://www.securityfocus.com/infocus/1729

- DDOS and SYN_Recv Attacks And some SOlutions
http://www.vbulletin.com/forum/showthread.php?t=126699

- Distributed Reflection Denial of Service
http://www.grc.com/dos/drdos.htm

- Dynamic iptables firewalls
http://www-128.ibm.com/developerworks/library/l-fw/

- Preventing DDoS Attacks
http://www.linuxsecurity.com/content/view/121960/49/

- Distributed Denial of Service (DDoS) Attacks/tools
http://staff.washington.edu/dittrich/misc/ddos/

- Linux firewall rulesets and snippets of rule sets
http://www.gotroot.com/tiki-index.php?page=Linux%20Firewall%20rules


.


Powered by

http://emiliogomez.com.ar