• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Is there a universal TCP/IP responding server

MonkeyK

Golden Member
I am looking for a tool that responds to TCP/IP requests on a large number of common ports. Does something like this exist?

I hope to use it so that I can direct traffic identified as suspicious to that server and capture as much of the request info as possible.
 
Linux firewall, aka netfilter, is a list of packet match rules. If a packet matches the criteria of a rule, then the rule performs an action (such as write details to a log file).

The easiest criteria is "match all", but one can narrow that down to "match all TCP packets".

Programs like SNORT can do more -- to look into the payload (content of the packet) in addition to address, etc that the netfilter focuses on.
 
I could be completely off, because I am pretty new to this stuff, so here is what is happening...
I have a network rule that sends any DNS requests associated with Malware to a specific IP address (this is called a sinkhole). But since the IP address is not actually configured to accept the traffic, the send is never completed and it doesn't get a chance to log the URL.
I do get the IP address making the request, but I would like the sinkhole to accept the traffic so that I can capture the rest of it.
Can a tool like SNORT capture request details if nothing is configured to receive the traffic?
 
Back
Top