Goline Logo

News

  • New Partnership Between Goline and EaseUS: Technology and Innovation at Your Service. We are excited to announce our collaboration with EaseUS, a leading company in data management, file recovery, and disk cloning software. This collaboration allows us to provide our users with reliable and cutting-edge tools to manage and protect their devices efficiently. Exploring the Benefits of Our New Partnership with EaseUS This collaboration enhances our capability to deliver top-notch services to our community. With EaseUS, you can optimize storage space, recover lost files, and clone disks easily and securely. Whether you're a home user or an IT professional, you'll...
  • In the supply and logistics sectors, email communication is pivotal. However, organizations face threats like email fraud and phishing. GOLINE SA's clients struggled with configuring email authentication protocols manually. To address this challenge, GOLINE SA partners with PowerDMARC as an MSP Partner, collaborating to streamline implementation and management. PowerDMARC's cloud-based platform automated DMARC, SPF, and DKIM protocols for GOLINE SA's clients. This streamlined the transition to DMARC enforcement policies, bolstering domain protection without compromising email deliverability. The intuitive platform facilitated easy navigation and provided detailed reporting for proactive issue resolution. Strategic Collaboration: GOLINE SA Partners with PowerDMARC GOLINE SA's clients...

Linux – Detecting DDOS Attacks (tcpdump)

 # visualizza tutte le connessioni che comprendano l'host prtg.goline.ch
tcpdump -i ens160 host prtg.goline.ch

# visualizza tutti i pacchetti syn in ingresso
tcpdump -i ens160 -n tcp[tcpflags] == tcp-syn

# visualizza tutti i pacchetti provenienti da uno specifico host come sorgente (src)
tcpdump -i ens160 src host prtg.goline.ch

# visualizza tutti i pacchetti destinati a uno specifico host come sorgente (dst)
tcpdump -i ens160 dst host prtg.goline.ch

# determina se ci sia in corso un SYN flood
netstat -npt | awk '{print $6}' | sort | uniq -c | sort -nr | head

# visualizza il conteggio delle connessioni TCP ordinate per indirizzo IP
netstat -npt | awk '{print $5}' | grep -Eo '([0-9]{1,3}.){3}[0-9]{1,3}' | cut -d: -f1 | sort | uniq -c | sort -nr | head

# visualizza il conto delle connessioni TCP ordinate per indirizzo IP su una specifica porta (MOLTO FIGO!) – Specificare la porta, tipo 443
netstat -npt | grep <port> | awk '{print $5}' | grep -Eo '([0-9]{1,3}.){3}[0-9]{1,3}' | cut -d: -f1 | sort | uniq -c | sort -nr | head

# visualizza il conteggio delle connessioni e le ordina per indirizzo IP
netstat -npt | awk '{print $5}' | grep -Eo '([0-9]{1,3}.){3}[0-9]{1,3}' | cut -d: -f1 | sort | uniq -c | sort -nr | head

# visualizza il conteggio di tutte le connessioni TCP "ESTABLISHED" di una specifica porta ordinandole per IP
netstat -npt | grep <port> | grep ESTABLISHED | awk '{print $5}' | grep -Eo '([0-9]{1,3}.){3}[0-9]{1,3}' | cut -d: -f1 | sort | uniq -c | sort -nr | head

# visualizza il conteggio di tutte le connessioni TCP "ESTABLISHED" di ordinandole per IP
netstat -npt | grep ESTABLISHED | awk '{print $5}' | grep -Eo '([0-9]{1,3}.){3}[0-9]{1,3}' | cut -d: -f1 | sort | uniq -c | sort -nr | head

# determina se l'attacco SYN è da un singolo IP (DOS attack) o da molteplici IP (DDOS attack)
netstat -npt | grep SYN_RECV | awk '{print $5}' | grep -Eo '([0-9]{1,3}.){3}[0-9]{1,3}' | cut -d: -f1 | sort | uniq -c | sort -nr | head

 

0 0 votes
Article Rating
Subscribe
Notify of
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x
| Reply