当前位置:网站首页>About CC Attacks
About CC Attacks
2022-08-11 04:56:00 【Zhongyun Era-Defense Testable-Xiaoyu】
CC attack has certain concealment, so how to determine whether the server is suffering or has been attacked by CC? The following three methods can be used to determine it.
1. When the command line method is generally attacked by CC, the Web server will be closed to the outside world on port 80, because this port has been blocked by a large amount of junk data, and the normal connection will be terminated.It can be viewed by entering the command netstat -an on the command line. "SYN_RECEIVED" is the TCP connection status flag, which means "is in the initial synchronization state of the connection", indicating that the handshake response cannot be established and is in a waiting state.This is the characteristic of an attack. In general, there are many such records, indicating attacks from different proxy IPs.
2. Batch method The above method requires manual input of commands and if there are too many IP connections to the Web server, it seems to be laborious. You can create a batch file and use the script code to determine whether there is a CC attack.The script filters out all current connections to port 80.When you feel that the server is abnormal, you can double-click to run the batch file, and then check all connections in the open log.log file.If the same IP has more connections to the server, it can basically be determined that the IP is performing a CC attack on the server.
3. View system logs Web logs are generally located in the C:\WINDOWS\system32\LogFiles\HTTPERR directory, and a log file similar to httperr1.log is used in this directory. This file is a record of web access errors.The administrator can select the corresponding log to open according to the log time attribute to analyze whether the Web is attacked by CC.
By default, there are not many items recorded in the Web log. You can set it through IIS to allow the Web log to record more items for security analysis.The operation steps are: "Start→Administrative Tools" to open "Internet Information Server", expand the item on the left to locate the corresponding Web site, then right-click and select "Properties" to open the site properties window, under the "Website" tabClick the "Properties" button, and under the "Advanced" tab of the "Logging Properties" window, you can check the corresponding "Extended Properties" to allow Web logs to be recorded.For example, the three items of "bytes sent", "bytes received", and "time used" are not selected by default, but they are very useful in recording and judging CC attacks and can be selected.In addition, if you have high security requirements, you can set the "New Log Schedule" under the "General" tab to log it "hourly" or "every day".In order to determine the time for future analysis, you can check the "Use local time for file naming and creation".
边栏推荐
猜你喜欢
Word2021 中的图片保存后就变模糊了
Layered Architecture & SOA Architecture
干货:服务器网卡组技术原理与实践
交换机和路由器技术-26-OSPF末梢区域配置
IP-Guard如何禁止运行U盘程序
2021 Network Planning Designer Afternoon Case Questions
form form submission database Chinese becomes a question mark
破解事务性工作瓶颈,君子签电子合同释放HR“源动力”!
How to use svg-icon (svg-sprite-loader plugin)
交换机和路由器技术-35-NAT转PAT
随机推荐
The use of async (asynchronous) and await
【Web3 系列开发教程——创建你的第一个 NFT(9)】如何在手机钱包里查看你的 NFT
剑指offer_抽象建模能力
Zabbix builds enterprise-level monitoring and alarm platform
【FPGA教程案例49】控制案例1——基于FPGA的PID控制器verilog实现
如何阅读论文
Do you understand how the Selenium automated testing framework works?
paddlepaddle实现CS_CE Loss且并入PaddleClas
Merkel Studio--OpenEuler Training Notes (1)
-Fill in color-
zabbix构建企业级监控告警平台
ERROR: Could not install packages due to an OSError: [Errno 2] 没有那个文件或目录: ‘/data/xxxx
【yolov7系列三】实战从0构建训练自己的数据集
How IP-Guard prohibits running U disk programs
优化是一种习惯●出发点是“站在靠近临界“的地方
About the pom.xml file
How to use svg-icon (svg-sprite-loader plugin)
Application of Identification Cryptography in IMS Network
网络安全培训机构哪家好?排名怎么选择?
Jetson Orin platform 4-16 channel GMSL2/GSML1 camera acquisition kit recommended