当前位置:网站首页>About CC Attacks
About CC Attacks
2022-08-11 04:56:00 【Zhongyun Era-Defense Testable-Xiaoyu】
CC attack has certain concealment, so how to determine whether the server is suffering or has been attacked by CC? The following three methods can be used to determine it.
1. When the command line method is generally attacked by CC, the Web server will be closed to the outside world on port 80, because this port has been blocked by a large amount of junk data, and the normal connection will be terminated.It can be viewed by entering the command netstat -an on the command line. "SYN_RECEIVED" is the TCP connection status flag, which means "is in the initial synchronization state of the connection", indicating that the handshake response cannot be established and is in a waiting state.This is the characteristic of an attack. In general, there are many such records, indicating attacks from different proxy IPs.
2. Batch method The above method requires manual input of commands and if there are too many IP connections to the Web server, it seems to be laborious. You can create a batch file and use the script code to determine whether there is a CC attack.The script filters out all current connections to port 80.When you feel that the server is abnormal, you can double-click to run the batch file, and then check all connections in the open log.log file.If the same IP has more connections to the server, it can basically be determined that the IP is performing a CC attack on the server.
3. View system logs Web logs are generally located in the C:\WINDOWS\system32\LogFiles\HTTPERR directory, and a log file similar to httperr1.log is used in this directory. This file is a record of web access errors.The administrator can select the corresponding log to open according to the log time attribute to analyze whether the Web is attacked by CC.
By default, there are not many items recorded in the Web log. You can set it through IIS to allow the Web log to record more items for security analysis.The operation steps are: "Start→Administrative Tools" to open "Internet Information Server", expand the item on the left to locate the corresponding Web site, then right-click and select "Properties" to open the site properties window, under the "Website" tabClick the "Properties" button, and under the "Advanced" tab of the "Logging Properties" window, you can check the corresponding "Extended Properties" to allow Web logs to be recorded.For example, the three items of "bytes sent", "bytes received", and "time used" are not selected by default, but they are very useful in recording and judging CC attacks and can be selected.In addition, if you have high security requirements, you can set the "New Log Schedule" under the "General" tab to log it "hourly" or "every day".In order to determine the time for future analysis, you can check the "Use local time for file naming and creation".
边栏推荐
- The priority queue
- Network Skill Tree
- Switch and Router Technology - 28 - NSSA Areas for OSPF
- Mysql中事件和定时任务
- 交换机和路由器技术-34-动态NAT
- Switch and Router Technology - 25 - OSPF Multi-Area Configuration
- Development Tools Lecture 7: Alibaba Cloud Log Query and Analysis
- [E-commerce operation] How to formulate a social media marketing strategy?
- Application of Identification Cryptography in IMS Network
- Harvesting of radio frequency energy
猜你喜欢

破解事务性工作瓶颈,君子签电子合同释放HR“源动力”!

论文笔记:Bag of Tricks for Long-Tailed Visual Recognition with Deep Convolutional Neural Networks

0 Basic software test for career change, self-study for 3 months, 12k*13 salary offer

Switch and Router Technology - 28 - NSSA Areas for OSPF

IP-Guard如何禁止运行U盘程序

C语言题解:谁是凶手!

论文笔记:BBN: Bilateral-Branch Network with Cumulative Learningfor Long-Tailed Visual Recognition

findViewById返回null的问题

Switch and Router Technology-27-OSPF Route Redistribution

To break the bottleneck of transactional work, the gentleman signs the electronic contract to release the "source power" of HR!
随机推荐
破解事务性工作瓶颈,君子签电子合同释放HR“源动力”!
简历里写了会代码,却依然过不了面试这一关
Kong实现禁止国外IP访问
[QNX Hypervisor 2.2用户手册]10.16 vdev virtio-blk
绿盾加密如何顺利切换成IP-Guard加密
一起Talk编程语言吧
[QNX Hypervisor 2.2用户手册]10.15 vdev timer8254
ERROR: Could not install packages due to an OSError: [Errno 2] 没有那个文件或目录: ‘/data/xxxx
MQ框架应用比较
网络协议1
对象的创建以及显示转换
Mysql: set the primary key to automatically increase the starting value
Network Skill Tree
findViewById返回null的问题
澳大利亚网络空间安全体系建设论析
2.2 user manual] [QNX Hypervisor 10.15 vdev timer8254
The shortest path out of the maze
C语言题解:谁是凶手!
2021 Network Planning Designer Afternoon Case Questions
项目实战第二十七讲:状态模式在重名品牌中的应用