On Sat, 9 Sep 2000, Harry Putnam wrote:
> netstat -antp |grep netscape:
> 
> tcp        1      0 my.isp.address:1150     64.208.32.100:80
> CLOSE_WAIT  22565/netscape-comm 
> 
> Where as 
> netstat -plut| grep 22565:
> (no hits)
> 
> No doubt there is good reason for this but I find netstat -antp to
> give more usefull info more often.

You don't understand the difference between -antp and -lntp.

-antp shows basically all sockets and shows the processes that are using
them.

-lntp (-l is for listen, check the man page) show only sockets that are
_listening_ to the network and the corresponding processes.

If your system were to be remotely controllable, if would have to use
a listening socket.  Your netscape-communicator is _not_ a server process,
so it won't show up there.  And as the malicious process could be UDP too,
I'd include -u in there, ie. -ltunp.

Well, the exploit could be some kind of "call home every X hours" and it
wouldn't show, but I think those are a very small minority.  Also, for it
to be really useful, the connection (if it were TCP) would have to show in
ESTABLISHED state in -antp.



-- 
Pekka Savola                    "Tell me of difficulties surmounted, 
[EMAIL PROTECTED]          not those you stumble over and fall"



_______________________________________________
Redhat-devel-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-devel-list

Reply via email to