Premium Content

Access "Double-Check with Routers"

Published: 12 Oct 2012

BITS & BOLTS Conventional routers are the perfect network security auditing device. Take advantage of what they see. Scripts: Simple Log Parsing The following is a simple script you can use to parse router logs. The initial instructions copy the logs to a new location, so the originals remain intact for auditing purposes. The grep commands that follow look for potentially threatening traffic (e.g., an abnormally high number of TCP resets or attackers using ICMP) and stash them in a separate file for further analysis. cp /var/log/messages.1 /root/logcheck/full_router.log cd /root/logcheck grep ' R ' full_router.log > resets.txt grep udp full_router.log | grep '.53[: ]' > dns_udp.txt grep tcp full_router.log | grep '.53[: ]' > dns_tcp.txt grep '.25: ' full_router.log | grep ' S ' > smtp.txt grep '.22[: ]' full_router.log > internal_ssh.txt grep '.123: ' full_router.log > ntp.txt grep '.3307[: ]' full_router.log > op-session-proxy.txt grep unreachable full_router.log > icmp-unreachables.txt Routers see everything that crosses your network. They direct the flow... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free