Re: DDoS attacks ... identifying destination ...

2007-09-06 Thread Vlad GALU
On 9/6/07, Marc G. Fournier <[EMAIL PROTECTED]> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > > Today, I got hit by an attack, but haven't been able to easily determine whom > was being attacked ... > > I run ipaudit to monitor bandwidth usage, so I have 'source / destination' > info

Re: DDoS attacks ... identifying destination ...

2007-09-06 Thread Gary Palmer
On Thu, Sep 06, 2007 at 03:48:37PM -0300, Marc G. Fournier wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > > Today, I got hit by an attack, but haven't been able to easily determine whom > was being attacked ... > > I run ipaudit to monitor bandwidth usage, so I have 'source / dest

Re: DDoS attacks ... identifying destination ...

2007-09-06 Thread Art Mason
On Thursday 06 September 2007 14:59:36 Olivier Brisson wrote: > * Marc G. Fournier <[EMAIL PROTECTED]> [070906 21:28]: > > Is there either a command line command, or ports tool, that I can use > > similar to top, or systat -iostat, that will help identify the IP that is > > being attacked? > > In s

Re: DDoS attacks ... identifying destination ...

2007-09-06 Thread Mike Makonnen
On Thu, Sep 06, 2007 at 03:48:37PM -0300, Marc G. Fournier wrote: > > Is there either a command line command, or ports tool, that I can use similar > to top, or systat -iostat, that will help identify the IP that is being > attacked? > I've found net-mgmt/iftop to be very usefull in the past.

Re: DDoS attacks ... identifying destination ...

2007-09-06 Thread Olivier Brisson
* Marc G. Fournier <[EMAIL PROTECTED]> [070906 21:28]: > > Is there either a command line command, or ports tool, that I can use similar > to top, or systat -iostat, that will help identify the IP that is being > attacked? In some way, you could also use wireshark: http://www.wireshark.org/ Ol

Re: DDoS attacks ... identifying destination ...

2007-09-06 Thread Eric F Crist
On Sep 6, 2007, at 1:48 PMSep 6, 2007, Marc G. Fournier wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Today, I got hit by an attack, but haven't been able to easily determine whom was being attacked ... I run ipaudit to monitor bandwidth usage, so I have 'source / destination' inf