Date: Tue, 12 Jul 2022 11:26:29 +0000 From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 265167] netstat on Linux has a flag to find hte program that does portbinding, FreeBSD does not Message-ID: <bug-265167-227@https.bugs.freebsd.org/bugzilla/>
index | next in thread | raw e-mail
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=265167 Bug ID: 265167 Summary: netstat on Linux has a flag to find hte program that does portbinding, FreeBSD does not Product: Base System Version: Unspecified Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: gnu Assignee: bugs@FreeBSD.org Reporter: microlaser@gmail.com netstat on Linux has a flag that allows you to identify the program that is binding to the port, you can run "netstat -pan" and the -p flag tells you the program that makes the portbinding. This can be used to find reverse shells which I have witnessed being used by state threat actors. It is very hard to find a reverse shell on FreeBSD because this flag is missing, and if you look at the man page there is no correlating flag that does the same thing. I realized this is a feature request but the Freebsd source code is the basis of super-secure OpenBSD and MacOS, and so it makes sense to push the change to improve netstat analysis to FreeBSD and let the others follow course. Thank you, Michael Lazin -- You are receiving this mail because: You are the assignee for the bug.home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-265167-227>
