Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.
Note that I only copied rows related to 80 and 8080.
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 869/httpd tcp 0 0 :::80 :::* LISTEN 869/httpd tcp 0 0 :::8080 :::* LISTEN 32767/java
|Intranet and Kerberos Authentication (not sharepoint!)||8||91|
|How should I mount this 3 TB USB Hard disk to my Linux server?||9||72|
|How to clone solaris 10 machine||33||71|
|linux apache localhost dev laptop||5||32|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
17 Experts available now in Live!