Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place! |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
04-12-2004, 10:45 AM
|
#1
|
Member
Registered: Mar 2004
Location: uk
Distribution: fedora2, slackware10
Posts: 54
Rep:
|
feel like being hacked?????
hi,
i typed in netstat command, and the screen shows me the result like this
Active Internet connections (w/o servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 268 192.168.1.100:ssh cpc1-nott2-5-0-cus:1436 ESTABLISHED
tcp 0 0 192.168.1.100:http 12.119.251.194:15786 TIME_WAIT
tcp 0 0 192.168.1.100:http 12.119.251.194:16999 TIME_WAIT
tcp 0 0 192.168.1.100:http 12.119.251.194:21849 ESTABLISHED
tcp 0 83464 192.168.1.100:33008 hyper.physics.not:41930 ESTABLISHED
tcp 0 16616 192.168.1.100:http 12.119.251.194:19405 ESTABLISHED
tcp 0 0 192.168.1.100:33002 hyper.physics.nott:2121 ESTABLISHED
i'm not sure what "hyper.physics.not:41930" doing on my computer, have i been hacked? what is it doing on port 33008 and 33002, can anyone here please help me what it is???
|
|
|
04-12-2004, 11:18 AM
|
#2
|
LQ Guru
Registered: Jan 2001
Posts: 24,149
|
Got any apps that use the net open at this time? Doubt that your getting hacked though..
|
|
|
04-12-2004, 11:58 AM
|
#3
|
Member
Registered: Mar 2004
Location: uk
Distribution: fedora2, slackware10
Posts: 54
Original Poster
Rep:
|
Quote:
Originally posted by trickykid
Got any apps that use the net open at this time? Doubt that your getting hacked though..
|
only vsftp, telnet, ssh, and apache running for network
so i don't know why
|
|
|
04-12-2004, 12:29 PM
|
#4
|
Member
Registered: Apr 2004
Distribution: Debian
Posts: 185
Rep:
|
Have you tried netstat -anp this should show you what is running on that port.
|
|
|
04-12-2004, 01:37 PM
|
#5
|
Member
Registered: Mar 2004
Location: uk
Distribution: fedora2, slackware10
Posts: 54
Original Poster
Rep:
|
yeah, i tried that as well
does anyone know where is the log file which it keeps all the login details, i think i'd better check that file, see if there is any intruders
|
|
|
04-12-2004, 01:41 PM
|
#6
|
LQ Guru
Registered: Jan 2001
Posts: 24,149
|
Quote:
Originally posted by chongluo
yeah, i tried that as well
does anyone know where is the log file which it keeps all the login details, i think i'd better check that file, see if there is any intruders
|
/var/log/messages or you can use the command last to see log info.
|
|
|
04-12-2004, 02:06 PM
|
#7
|
Member
Registered: Apr 2004
Distribution: Debian
Posts: 185
Rep:
|
Then what was the ouput of "netstat -anp". Also "fuser -n tcp port#" will show you the pid that has this port open. It looks like you connected on port 2121 to them and then the other connection might be related. You can also run "tcpdump -i eth0 port port#" to watch the data flow or write it to a file so you can view it with ethereal. "tcpdump -i eth0 port port# -w file.out -s 1500"
Last edited by peacebwitchu; 04-12-2004 at 02:12 PM.
|
|
|
All times are GMT -5. The time now is 11:22 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|