Solved

netstat

Posted on 1998-08-02
3
629 Views
Last Modified: 2013-12-23
When I do a netstat command I see several established
connections on my box.  I allowed a kid full access (big
mistake) so he could do a bot.  I find that as superuser and
logged in remote I cannot do a reboot.  How can I kill these
connections off ?
0
Comment
Question by:fm
3 Comments
 
LVL 3

Expert Comment

by:elfie
ID: 1583066
Not all connections need to be remote connections.
In general killing connections, means that will need to kill some services(deamon processes).
Most of the local connections will be re-established, once the deamon process is running again.
You can check your /etc/rc files to see which services are started. You can disabled them by putting them in comment (Also verify /etc/inittab)

0
 
LVL 1

Expert Comment

by:mohammedg
ID: 1583067
What type of Unix are you running ?
And when you say that you allowed full access, does that mean that you gave full root
permissions to that user?
0
 
LVL 2

Accepted Solution

by:
JYoungman earned 50 total points
ID: 1583068
You can use identd (rfc 1413) queries to find out
who the processes belong to, and often what their PID is.

Alternatively you could add an entry to the routing table for the particular host to which the unwanted data is directed, to make sure it fails to get there (or use firewall output rules if your box is BSD or Linux based).


I'm very surprised that you can't do a reboot from a remote machine.  What does "shutdown" say when it refuses? You are running it as root, yes?


0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question