Check Listening Ports in Linux (Ports in use)

Image
  How to Check for Listening Ports in Linux (Ports in use) When troubleshooting network connectivity or application-specific issues, one of the first things to check should be what ports are actually in use on your system and which application is listening on a specific port. This article explains how to use the  netstat ,  ss  and  lsof  commands to find out which services are listening on which ports. The instructions are applicable for all Linux and Unix-based operating systems like macOS. What is Listening Port Network port is identified by its number, the associated IP address, and type of the communication protocol, such as TCP or UDP. Listening port is a network port on which an application or process listens on, acting as a communication endpoint. Each listening port can be open or closed (filtered) using a firewall. In general terms, an  open port  is a network port that accepts incoming packets from remote locations. You can’t have two s...

What is Cyber Attacks ? And How many type of Cyber Attacks in 2022 .

What is a Cyber Attack?

A digital assault is deliberate double-dealing of PC frameworks, organizations, and innovation subordinate ventures. These assaults utilize malevolent code to alter PC code, information, or rationale. Coming full circle into disastrous outcomes that can think twice about information and proclaim cybercrimes like data and fraud. A digital assault is otherwise called a PC network assault (CNA)


Common Types Attacks Phishing Attacks

Phishing is a sort of friendly design normally utilized to take client information, for example, Mastercard numbers and login qualifications. It happens when an assailant, acting like a confided-in individual, deceives the casualty to open an instant message, email, or text. The casualty is then deluded to open a vindictive connection that can cause the freezing of a framework as a feature of a ransomware assault, uncovering touchy data, or establishment of malware.

Phishing is frequently used to get traction in legislative or corporate organizations as a component of a more huge plot like a high level of diligent danger (APT). In such a case, representatives are compromised to acquire restricted admittance to get information, disperse malware in a shut climate, and sidestep security boundaries.


Spear Phishing Attacks

Spear phishing is an email focused on a specific individual or association, wanting unapproved admittance to significant data. These hacks are not executed by irregular aggressors yet are doubtlessly finished by people out for proprietary innovations, monetary benefit, or military insight.

Skewer phishing messages seem to begin from a person inside the beneficiary's own association or somebody the objective knows actually. Frequently, government-supported hacktivists and programmers play out these exercises. Cybercriminals likewise do these assaults fully intent on exchanging classified information to privately owned businesses and state-run administrations. These assailants utilize social designing and independently planned ways to deal with really customize sites and messages.


Whale Phishing Attack


A whale phishing assault is a kind of phishing that focuses on high-profile workers like the CFO or CEO. It is pointed toward taking fundamental data since those standing firm on higher footings in an organization have limitless admittance to delicate data. Most whaling cases maneuver the casualty toward allowing high-worth wire moves to the aggressor.
The term whaling connotes the size of the assault, and whales are focused on relying upon their situation inside the association. Since they are profoundly focused on, whaling assaults are more challenging to see contrasted with the standard phishing assaults.

In a business, framework security heads can diminish the viability of such a hack by empowering the corporate administration staff to go to security mindfulness preparing.


Malware Attacks
Malware is a code that is made to subtly influence a compromised PC framework without the assent of the client. This expansive definition incorporates numerous specific sorts of malicious programming (malware) like spyware, ransomware, order, and control.

Malware varies from another programming in that it can spread across an organization, cause changes and harm, stay imperceptible, and be industrious in the tainted framework. It can annihilate an organization and push a machine's exhibition to the brink of collapse.

Ransomware
Ransomware blocks admittance to a casualties information, commonly threatening to erase it assuming that payment is paid. There is no assurance that paying a payment will recapture admittance to the information. Ransomware is regularly completed through a Trojan conveying a payload masked as a genuine document.







Drive-by Attack

A drive-by assault is a typical technique for circulating malware.

A digital assailant searches for a shaky site and plants pernicious content into PHP or HTTP in one of the pages. This content can introduce malware into the PC that visits this site or become an IFRAME that diverts the casualty's program into a site constrained by the assailant. By and large, these contents are jumbled, and this makes the code to be confounded to investigate by security scientists. These assaults are known as a drive-by on the grounds that they don't need any activity on the casualty's part aside from visiting the compromised site. At the point when they visit the compromised site, they naturally and quietly become tainted assuming that their PC is powerless against the malware, particularly in the event that they have not applied security updates to their applications.


Trojan Horses


A Trojan is a malicious software program that misrepresents itself to appear useful. They spread by looking like routine software and persuading a victim to install it. Trojans are considered among the most dangerous type of all malware, as they are often designed to steal financial information.





Web Attacks 


SQL Injection


SQL injection, also known as SQLI, is a kind of attack that employs malicious code to manipulate backend databases to access information that was not intended for display. This may include numerous items including private customer details, user lists, or sensitive company data.

SQLI can have devastating effects on a business. A successful SQLI attack can cause deletion of entire tables, unauthorized viewing of user lists, and in some cases, the attacker can gain administrative access to a database. These can be highly detrimental to a business. When calculating the probable cost of SQLI, you need to consider the loss of customer trust in case personal information like addresses, credit card details, and phone numbers are stolen.


Cross-Site Scripting


Cross-webpage prearranging (XSS) is a sort of infusion break where the aggressor sends noxious content into content from in any case respectable sites. It happens when a questionable source is permitted to connect its own code into web applications, and the malevolent code is packaged along with a dynamic substance that is then shipped off the casualty's program.

Malignant code is typically sent as bits of Javascript code executed by the objective's program. The adventures can remember malignant executable contents for some dialects including Flash, HTML, Java, and Ajax. XSS assaults can be extremely crushing, notwithstanding, reducing the weaknesses that empower these assaults is generally basic.

diagram of how a ddos cyber attack happens

















Different Types of Cyber Security Threats


Conveyed Denial-of-Service (DDoS) assault?


Forswearing of administration (DDoS) targets closing down an organization or administration, making it be blocked off to its planned clients. The assaults achieve this mission by overpowering the objective with traffic or flooding it with data that sets off an accident. In the two circumstances, the DoS attack denies genuine clients like workers, account holders, and individuals from the asset or administration they anticipated.
DDoS assaults are regularly focused on web servers of high-profile associations, for example, exchange associations and government, media organizations, trade, and banking. Albeit these assaults don't bring about the misfortune or burglary of indispensable data or different resources, they can cost casualty loads of cash and time to relieve. DDoS is frequently utilized in a mix to divert from other organization assaults.


Password Attacks

A secret phrase assault just means an endeavor to decode or acquire a client's secret key with unlawful goals.

Wafers can utilize secret key sniffers, word reference assaults, and breaking programs in secret phrase assaults. There are not many safeguard systems against secret phrase assaults, however, generally, the cure is teaching a secret word strategy that incorporates a base length, incessant changes, and unrecognizable words.

Secret phrase assaults are frequently done by recuperating passwords put away or sent out through a PC framework. The secret key recuperation is typically finished by consistently speculating the secret key through a PC calculation. The PC attempts a few blends until it effectively finds the secret phrase.


Snooping Attack

Snooping assaults start with the capture attempt of organization traffic.
An Eavesdropping break, otherwise called sneaking around or sniffing, is an organization security assault were a singular attempts to take the data that cell phones, PCs and other computerized gadgets send or get This hack gains by unstable organization transmissions to get to the information being communicated. Listening in is trying to distinguish since it doesn't cause unusual information transmissions.

These assaults target debilitated transmissions between the client and server that empower the assailant to get network transmissions. An assailant can introduce network screens, for example, sniffers on a server or PC to play out a snooping assault and block information as it is being communicated. Any gadget inside the communicating and getting network is a weakness point, including the terminal and starting gadgets themselves. One method for safeguarding against these assaults is knowing what gadgets are associated with a specific organization and what programming is run on these gadgets.







Comments

Popular posts from this blog

Check Listening Ports in Linux (Ports in use)