Check Listening Ports in Linux (Ports in use)

Image
  How to Check for Listening Ports in Linux (Ports in use) When troubleshooting network connectivity or application-specific issues, one of the first things to check should be what ports are actually in use on your system and which application is listening on a specific port. This article explains how to use the  netstat ,  ss  and  lsof  commands to find out which services are listening on which ports. The instructions are applicable for all Linux and Unix-based operating systems like macOS. What is Listening Port Network port is identified by its number, the associated IP address, and type of the communication protocol, such as TCP or UDP. Listening port is a network port on which an application or process listens on, acting as a communication endpoint. Each listening port can be open or closed (filtered) using a firewall. In general terms, an  open port  is a network port that accepts incoming packets from remote locations. You can’t have two s...

What is DDoS ?

 






A Distributed  Denial of Service (DoS) attack is a malicious attempt to affect the availability of a targeted system, such as a website or application, to legitimate end-users. Typically, attackers generate large volumes of packets or requests ultimately overwhelming the target system. In the case of a Distributed Denial of Service (DDoS) attack, the attacker uses multiple compromised or controlled sources to generate the attack.






In general, DDoS attacks can be segregated by which layer of the Open Systems Interconnection (OSI) model they attack. They are most common at the Network (layer 3), Transport (Layer 4), Presentation (Layer 6), and Application (Layer 7) Layers.



DDOS Attack Classification

While thinking about mitigation techniques against these attacks, it is useful to group them as Infrastructure layer (Layers 3 and 4) and Application Layer (Layer 6 and 7) attacks.


Infrastructure Layer Attacks


Attacks at Layer 3 and 4, are typically categorized as Infrastructure layer attacks. These are also the most common type of DDoS attack and include vectors like synchronized (SYN) floods and other reflection attacks like User Datagram Packet (UDP) floods. These attacks are usually large in volume and aim to overload the capacity of the network or the application servers. But fortunately, these are also the type of attacks that have clear signatures and are easier to detect.


Application Layer Attacks


Attacks at Layer 6 and 7, are often categorized as Application layer attacks. While these attacks are less common, they also tend to be more sophisticated. These attacks are typically small in volume compared to the Infrastructure layer attacks but tend to focus on particular expensive parts of the application thereby making it unavailable for real users. For instance, a flood of HTTP requests to a login page, or an expensive search API, or even WordPress XML-RPC floods (also known as WordPress pingback attacks).


DDoS Protection Techniques


  1. Reduce Attack Surface Area
  2. Plan for Scale
  3. Know what is normal and abnormal traffic
  4. Deploy Firewalls for Sophisticated Application attacks
  5. Deploy Firewalls for Sophisticated Application attacks



A massive DDoS attack from various IP addresses is being carried out on the website of Roscosmos. It is currently not available for visiting,” a representative of the space agency told reporters.


Recently this has widely happened in the Russian and Ukraine Wars.





Comments

Popular posts from this blog

Check Listening Ports in Linux (Ports in use)

What is Cyber Attacks ? And How many type of Cyber Attacks in 2022 .