Date: Tue, 19 Sep 2000 15:17:31 +0300 From: Giorgos Keramidas <keramida@ceid.upatras.gr> To: John Indra <john@indocyber.com> Cc: freebsd-questions@FreeBSD.ORG Subject: Re: Hunt a nasty program Message-ID: <20000919151730.A352@gray.westgate.gr> In-Reply-To: <20000919191240.A355@indocyber.com>; from john@indocyber.com on Tue, Sep 19, 2000 at 07:12:40PM %2B0700 References: <20000919191240.A355@indocyber.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Sep 19, 2000 at 07:12:40PM +0700, John Indra wrote:
> Dear FreeBSD users...
>
> I'm suspecting that my system somehow has a program to ``attract'' SYN (as
> in SYN FLOOD) packet from remote computer. I'd like to hunt and kill the
> program. I know that it open a connection to certain host, but I don't which
> file did that.
>
> How do I hunt that nasty program?
You can use sockstat(1) to see which program has opened a network
connection. For instance, on my machine I see:
% sockstat
USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS
root nmbd 180 5 udp4 *.137 *.*
root nmbd 180 6 udp4 *.138 *.*
root nmbd 180 7 udp4 212.205.119.66.137 *.*
root nmbd 180 8 udp4 212.205.119.66.138 *.*
root smbd 178 5 tcp4 *.139 *.*
root sshd 117 3 tcp4 *.22 *.*
root sendmail 113 4 tcp4 *.25 *.*
root inetd 108 4 udp4 *.518 *.*
root inetd 108 5 tcp4 *.2401 *.*
root inetd 108 6 tcp4 *.113 *.*
root inetd 108 7 tcp4 *.119 *.*
root inetd 108 8 tcp4 *.23 *.*
root inetd 108 9 tcp4 *.21 *.*
root syslogd 81 4 udp4 *.514 *.*
--
Giorgos Keramidas, <keramida@ceid.upatras.gr>
For my public pgp2 key: finger -l keramida@diogenis.ceid.upatras.gr
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000919151730.A352>
