Código:
netstat -an | grep :80 | sort
Código:
netstat -n -p | grep SYN_REC | awk '{print $5}' | awk -F: '{print $1}'
Código:
netstat -n -p|grep SYN_REC | wc -l
Código:
netstat -lpn|grep :80 |awk '{print $5}'|sort
Código:
netstat -an | grep :80 | awk '{ print $5 }' | awk -F: '{ print $1 }' | sort | uniq -c | sort -n
Referencias
- Opciones de seguridad en Linux a través de /proc (I) y (II)
http://www.elhacker.net/opciones-seguridad-linux-proc.html
- Syctl.conf Hardening
http://www.eth0.us/sysctl
- Ipsysctl tutorial 1.0.4
http://ipsysctl-tutorial.frozentux.net/ipsysctl-tutorial.html
- Hardening the TCP/IP stack to SYN attacks
http://www.securityfocus.com/infocus/1729
- DDOS and SYN_Recv Attacks And some SOlutions
http://www.vbulletin.com/forum/showthread.php?t=126699
- Distributed Reflection Denial of Service
http://www.grc.com/dos/drdos.htm
- Dynamic iptables firewalls
http://www-128.ibm.com/developerworks/library/l-fw/
- Preventing DDoS Attacks
http://www.linuxsecurity.com/content/view/121960/49/
- Distributed Denial of Service (DDoS) Attacks/tools
http://staff.washington.edu/dittrich/misc/ddos/
- Linux firewall rulesets and snippets of rule sets
http://www.gotroot.com/tiki-index.php?page=Linux%20Firewall%20rules