• <span id="ycodp"></span>
    <span id="ycodp"><small id="ycodp"></small></span>
    1. <label id="ycodp"></label>
      <rt id="ycodp"><tr id="ycodp"><strike id="ycodp"></strike></tr></rt>
      <i id="ycodp"><strong id="ycodp"><ul id="ycodp"></ul></strong></i>
    2. 幫助中心

      這里有最新的使用文檔和教程

      < 返回

      Linux主機簡單判斷被CC攻擊的網站命令-比較直接有效

      2022-03-19 15:34 作者:31IDC 閱讀量:256 所屬分類:Linux系統

      CC攻擊很容易發起,并且幾乎不需要成本,導致現在的CC攻擊越來越多。
      大部分搞CC攻擊的人,都是用在網上下載的工具,這些工具很少去偽造特征,所以會留下一些痕跡。
      使用下面的命令,可以分析下是否在被CC攻擊。

      如果系統沒有安裝tcpdump可以先安裝

      通過yum -y install tcpdump 來安裝

      第一條命令:

      1. tcpdump -s0 -A -n -i any | grep -o -E '(GET|POST|HEAD) .*'



      正常的輸出結果類似于這樣
      POST /ajax/validator.php HTTP/1.1
      POST /api_redirect.php HTTP/1.1
      GET /team/57085.html HTTP/1.1
      POST /order/pay.php HTTP/1.1
      GET /static/goodsimg/20140324/1_47.jpg HTTP/1.1
      GET /static/theme/qq/css/index.css HTTP/1.1
      GET /static/js/index.js HTTP/1.1
      GET /static/js/customize.js HTTP/1.1
      GET /ajax/loginjs.php?type=topbar& HTTP/1.1
      GET /static/js/jquery.js HTTP/1.1
      GET /ajax/load_team_time.php?team_id=57085 HTTP/1.1
      GET /static/theme/qq/css/index.css HTTP/1.1
      GET /static/js/lazyload/jquery.lazyload.min.js HTTP/1.1
      GET /static/js/MSIE.PNG.js HTTP/1.1
      GET /static/js/index.js HTTP/1.1
      GET /static/js/customize.js HTTP/1.1
      GET /ajax/loginjs.php?type=topbar& HTTP/1.1
      GET /static/theme/qq/css/i/logo.jpg HTTP/1.1
      GET /static/theme/qq/css/i/logos.png HTTP/1.1
      GET /static/theme/qq/css/i/hot.gif HTTP/1.1
      GET /static/theme/qq/css/i/brand.gif HTTP/1.1
      GET /static/theme/qq/css/i/new.gif HTTP/1.1
      GET /static/js/jquery.js HTTP/1.1
      GET /static/theme/qq/css/i/logo.jpg HTTP/1.1
      正常命令結果以靜態文件為主,比如css,js,各種圖片。
      如果是被攻擊,會出現大量固定的地址,比如攻擊的是首頁,會有大量的“GET / HTTP/1.1”,或者有一定特征的地址,比如攻擊的如果是Discuz論壇,那么可能會出現大量的“/thread-隨機數字-1-1.html”這樣的地址。

      第二條命令:

      1. tcpdump -s0 -A -n -i any | grep  ^User-Agent


      輸出結果類似于下面:
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
      User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
      User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; 360space)
      User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
      User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; 360space)
      User-Agent: Mozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)
      User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
      User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
      User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
      User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
      User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; InfoPath.2)
      User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)

      這個是查看客戶端的useragent,正常的結果中,是各種各樣的useragent。
      大多數攻擊使用的是固定的useragent,也就是會看到同一個useragent在刷屏。隨機的useragent只見過一次,但是給搞成了類似于這樣“axd5m8usy”,還是可以分辨出來。

      第三條命令:

      1. tcpdump -s0 -A -n -i any | grep ^Host


      如果機器上的網站太多,可以用上面的命令找出是哪個網站在被大量請求
      輸出結果類似于下面這樣
      Host: www.server110.com
      Host: www.server110.com
      Host: www.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: www.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: www.server110.com
      Host: www.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: www.server110.com
      Host: upload.server110.com
      Host: upload.server110.com
      Host: www.server110.com

      一般系統不會默認安裝tcpdump命令
      centos安裝方法:yum install -y tcpdump
      debian/ubuntu安裝方法:apt-get install -y tcpdump

      很多小白用戶不懂得如何設置日志,查看日志,使用上面的命令則簡單的多,復制到命令行上運行即可。

      31IDC - 12 年深耕海外 IDC 高端資源

      主站蜘蛛池模板: 青青热久久综合网伊人| 精品福利一区二区三区精品国产第一国产综合精品 | 久久国产综合精品五月天| 久久婷婷五月综合色丁香| 亚洲国产成人久久综合碰碰动漫3d | 亚洲日韩久久综合中文字幕| 日韩亚洲国产综合高清| 天天在线天天综合网色| 一本综合久久国产二区| 亚洲国产aⅴ综合网| 亚洲欧洲日韩国产综合在线二区 | 狠狠色狠狠色综合久久| 亚洲综合精品成人| 国产亚洲综合网曝门系列| 久久婷婷成人综合色综合| 精品亚洲综合久久中文字幕| 97久久久精品综合88久久| 一本丁香综合久久久久不卡网站| 亚洲伊人色一综合网| 99热婷婷国产精品综合| 亚洲私人无码综合久久网| 狠色狠色狠狠色综合久久| 伊人久久成人成综合网222| 综合五月激情二区视频| 狠狠狠色丁香婷婷综合久久俺| 色综合小说天天综合网| 激情综合亚洲色婷婷五月| 亚洲综合图色40p| 综合久久国产九一剧情麻豆| 尹人久久大香找蕉综合影院| 激情伊人五月天久久综合| 久久综合亚洲色一区二区三区| 久久综合综合久久97色| 亚洲综合婷婷久久| 国产成人精品久久综合| 狠狠色丁香婷婷久久综合| 婷婷综合激六月情网| 国产成人综合久久精品下载| 亚洲国产成人五月综合网| 天天久久影视色香综合网| 97se亚洲综合在线|