fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

9.9K
active users

#netstat

0 posts0 participants0 posts today
OSTechNix<p>How To Check And Secure Open Ports In Linux <a href="https://floss.social/tags/Linuxnetworking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxnetworking</span></a> <a href="https://floss.social/tags/Linuxsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxsecurity</span></a> <a href="https://floss.social/tags/Linuxadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxadmin</span></a> <a href="https://floss.social/tags/Linuxhowto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxhowto</span></a> <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://floss.social/tags/netstat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netstat</span></a> <a href="https://floss.social/tags/ss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ss</span></a> <a href="https://floss.social/tags/firewalld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalld</span></a> <a href="https://floss.social/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> <a href="https://floss.social/tags/nmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nmap</span></a> <a href="https://floss.social/tags/lsof" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lsof</span></a> <br><a href="https://ostechnix.com/check-and-secure-open-ports-in-linux/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ostechnix.com/check-and-secure</span><span class="invisible">-open-ports-in-linux/</span></a></p>
Denis Szalkowski<p>La commande <a href="https://mamot.fr/tags/netstat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netstat</span></a> présente dans le package net-tools est bien plus synthétique et lisible que <a href="https://mamot.fr/tags/ss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ss</span></a> quant à la restitution de l'activité réseau d'une machine <a href="https://mamot.fr/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a></p><p><a href="https://www.dsfc.net/infra/reseau/netstat-activite-reseau-linux/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">dsfc.net/infra/reseau/netstat-</span><span class="invisible">activite-reseau-linux/</span></a></p>
Dustin<p>I learned last night that a Docker container will fail to launch properly, and in my case end up in a restarting loop forever, if the port the container is trying to use is being used by some other process on the system.</p><p>Using:</p><p>sudo netstat -nlp</p><p>produces a great set of data to checkout what is going on.</p><p><a href="https://geekdom.social/tags/Docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Docker</span></a><br><a href="https://geekdom.social/tags/Netstat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netstat</span></a></p>
Sascha Stumpler<p>Powershell - Display network connections (equivalent to netstat) <a href="http://dlvr.it/THHDf1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">dlvr.it/THHDf1</span><span class="invisible"></span></a> via PlanetPowerShell <a href="https://hessen.social/tags/Powershell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Powershell</span></a> <a href="https://hessen.social/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://hessen.social/tags/R%C3%A9seaux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Réseaux</span></a> <a href="https://hessen.social/tags/Netstat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netstat</span></a></p>
adingbatponder<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@Xavier" class="u-url mention">@<span>Xavier</span></a></span> Nice. Thanks. My result is below. Looks harmless... famous last words.. <a href="https://fosstodon.org/tags/netstat" class="mention hashtag" rel="tag">#<span>netstat</span></a></p>
Rhonda D'Vine 🏳️‍🌈<p>Was sind eigentlich eure Standard-Argumente für <a href="https://chaos.social/tags/netstat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netstat</span></a>? Bei mir wäre das -tulpen. Kollege verwendet -pant</p>
ADMIN magazine<p>Learn about scripting techniques to help manage netstat information <a href="https://www.admin-magazine.com/News/Using-Aliases-to-Manage-Netstat-Information" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/News/Using-</span><span class="invisible">Aliases-to-Manage-Netstat-Information</span></a> <a href="https://hachyderm.io/tags/netstat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netstat</span></a> <a href="https://hachyderm.io/tags/aliases" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aliases</span></a> <a href="https://hachyderm.io/tags/scripting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scripting</span></a> <a href="https://hachyderm.io/tags/statistics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>statistics</span></a> <a href="https://hachyderm.io/tags/output" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>output</span></a></p>
Tao of Mac<p>Sloth</p><p>Sloth is a nice graphical macOS application (by the creator of Platypus) that shows all open files, directories, pipes and devices in use by applications in your system:(...)</p><p><a href="https://botsin.space/tags/lsof" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lsof</span></a> <a href="https://botsin.space/tags/monitor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>monitor</span></a> <a href="https://botsin.space/tags/macos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macos</span></a> <a href="https://botsin.space/tags/resource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>resource</span></a> <a href="https://botsin.space/tags/netstat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netstat</span></a> <a href="https://botsin.space/tags/tcp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcp</span></a> <a href="https://botsin.space/tags/files" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>files</span></a> <a href="https://botsin.space/tags/sockets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sockets</span></a></p><p><a href="https://taoofmac.com/space/apps/sloth" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">taoofmac.com/space/apps/sloth</span><span class="invisible"></span></a></p>

This month, I’m going to wrap up discussion of network troubleshooting tools. So far, I’ve covered netstat, tcpdump, and ngrep and sniff. This month, I’ll discuss Ethereal, a tool for browsing network traffic interactively and analyzing network traffic. To put it more emphatically, Ethereal is the all-singing, all-dancing, packet-inspecting tool that all admins should have in their software toolboxes. Ethereal is capable of capturing packets for analysis or reading saved packet captures in a number of common formats. Ethereal support libpcap/tcpdump, Sun’s snoop/atmsnoop, LanAlyzer, MS Network Monitor, HPUX nettl, AIX iptrace, Cisco Secure IDS, and a number of others. (The full list can be found in the FAQ.) Ethereal supports more than 530 network protocols. You can also see supported protocols by selecting “Supported Protocols” from Ethereals Help menu. The Ethereal Interface I’ll start off by taking a look at Ethereal’s interface. Ethereal has a 3-pane interface that shows the user a great deal of information in an easy-to-use interface. The first pane shown gives a summary of captured packets (see Figure 1), displaying the packet number, its source and destination, protocol, and information about the packet. The middle pane gives detailed information about a selected packet, and the bottom pane displays the packet itself in a hexdump style. Note that you can edit the columns in the second pane using Ethereal’s Preferences dialog, found under the Edit menu. A particularly spiffy feature of Ethereal is that it will highlight each part of the packet when you click on the information in the middle pane. For example, let’s say you capture some traffic between your desktop and a Web site, as you’re requesting a Web page. In the first pane, you click on the packet containing a GET request. This displays that packet in the second and third panes. Then, you can click on a particular bit of information contained in that packet in the second window — like the packet’s source — and it will highlight the section of the packet that contains that information in the third window. Of course, you need some captured packet data to display. The Ethereal Web site features some interesting sample captures. They also have several capture formats so users can test Ethereal’s multi-format capabilities. Even if you don’t have much in the way of interesting traffic, it’s a good idea to familiarize yourself with Ethereal’s packet-capturing capabilities. The CTRL+k hotkey will bring […]

https://dissociatedpress.net/2004/08/24/the-open-road-ethereal/