Giter Site home page Giter Site logo

Comments (12)

pavel-odintsov avatar pavel-odintsov commented on June 3, 2024

from fastnetmon.

przemeksw avatar przemeksw commented on June 3, 2024

I do not know if I understand correctly.
In version 1.2.0 I was getting a pcap dump when an attack was detected and sending it by e-mail.
At the moment, even after tataku is detected, this dump is missing, even in the form of a log file.
Do I understand correctly that you have discontinued this functionality?
If so - how can we currently analyze what the system has detected and whether it is true or false?

from fastnetmon.

pavel-odintsov avatar pavel-odintsov commented on June 3, 2024

from fastnetmon.

przemeksw avatar przemeksw commented on June 3, 2024

Ok I see.
I actually described it wrong.
In earlier versions, I was getting around 20 lines of packet flow and it was actually under $4=attack_details
example:
2022-12-30 22:24:14.030461 51.178.56.235:33792 > 46.45.109.198:0 protocol: udp frag: 1 packets: 1 size: 68 bytes ttl: 117 sample ratio: 1024
2022-12-30 22:24:14.030481 80.77.122.198:389 > 46.45.109.198:80 protocol: udp frag: 1 packets: 1 size: 1522 bytes ttl: 121 sample ratio: 1024

From what you write, I should get the above for $4=ban, but I don't get it. I only get basic information about the number of packets for a given type of tcp/udp/icmp traffic, and such information.

from fastnetmon.

pavel-odintsov avatar pavel-odintsov commented on June 3, 2024

from fastnetmon.

przemeksw avatar przemeksw commented on June 3, 2024

from fastnetmon.

przemeksw avatar przemeksw commented on June 3, 2024

any ideas?

from fastnetmon.

pavel-odintsov avatar pavel-odintsov commented on June 3, 2024

Yep, we just did not implement this logic. Please wait 20 minutes and install FastNetMon Community again using:

wget https://install.fastnetmon.com/installer -Oinstaller
sudo chmod +x installer
sudo ./installer -install_community_edition

After this fix 587fc70 attack information to callback script will be in that format:

FastNetMon Guard: IP 192.168.1.201 blocked because incoming attack with power 395 pps
IP: 192.168.1.201
Attack type: unknown
Initial attack power: 395 packets per second
Peak attack power: 395 packets per second
Attack direction: incoming
Attack protocol: tcp
Total incoming traffic: 34 mbps
Total outgoing traffic: 0 mbps
Total incoming pps: 395 packets per second
Total outgoing pps: 340 packets per second
Total incoming flows: 0 flows per second
Total outgoing flows: 0 flows per second
Incoming ip fragmented traffic: 0 mbps
Outgoing ip fragmented traffic: 0 mbps
Incoming ip fragmented pps: 0 packets per second
Outgoing ip fragmented pps: 0 packets per second
Incoming dropped traffic: 0 mbps
Outgoing dropped traffic: 0 mbps
Incoming dropped pps: 0 packets per second
Outgoing dropped pps: 0 packets per second
Incoming tcp traffic: 34 mbps
Outgoing tcp traffic: 0 mbps
Incoming tcp pps: 395 packets per second
Outgoing tcp pps: 340 packets per second
Incoming syn tcp traffic: 0 mbps
Outgoing syn tcp traffic: 0 mbps
Incoming syn tcp pps: 0 packets per second
Outgoing syn tcp pps: 0 packets per second
Incoming udp traffic: 0 mbps
Outgoing udp traffic: 0 mbps
Incoming udp pps: 0 packets per second
Outgoing udp pps: 0 packets per second
Incoming icmp traffic: 0 mbps
Outgoing icmp traffic: 0 mbps
Incoming icmp pps: 0 packets per second
Outgoing icmp pps: 0 packets per second

Attack traffic dump

2023-07-31 12:03:06.334902 80.249.99.148:80 > 192.168.1.201:41610 protocol: tcp flags: ack frag: 0  packets: 1 size: 1466 bytes ttl: 249 sample ratio: 1  
2023-07-31 12:03:06.334920 80.249.99.148:80 > 192.168.1.201:41610 protocol: tcp flags: ack frag: 0  packets: 1 size: 21066 bytes ttl: 249 sample ratio: 1  
2023-07-31 12:03:06.334925 192.168.1.201:41610 > 80.249.99.148:80 protocol: tcp flags: ack frag: 0  packets: 1 size: 66 bytes ttl: 64 sample ratio: 1  
2023-07-31 12:03:06.334929 80.249.99.148:80 > 192.168.1.201:41610 protocol: tcp flags: psh,ack frag: 0  packets: 1 size: 4266 bytes ttl: 249 sample ratio: 1  
2023-07-31 12:03:06.334934 192.168.1.201:41610 > 80.249.99.148:80 protocol: tcp flags: ack frag: 0  packets: 1 size: 66 bytes ttl: 64 sample ratio: 1  
2023-07-31 12:03:06.334938 80.249.99.148:80 > 192.168.1.201:41610 protocol: tcp flags: ack frag: 0  packets: 1 size: 9866 bytes ttl: 249 sample ratio: 1  
2023-07-31 12:03:06.334942 192.168.1.201:41610 > 80.249.99.148:80 protocol: tcp flags: ack frag: 0  packets: 1 size: 66 bytes ttl: 64 sample ratio: 1  
2023-07-31 12:03:06.334946 80.249.99.148:80 > 192.168.1.201:41610 protocol: tcp flags: ack frag: 0  packets: 1 size: 22466 bytes ttl: 249 sample ratio: 1  
2023-07-31 12:03:06.334950 192.168.1.201:41610 > 80.249.99.148:80 protocol: tcp flags: ack frag: 0  packets: 1 size: 66 bytes ttl: 64 sample ratio: 1  
2023-07-31 12:03:06.334954 80.249.99.148:80 > 192.168.1.201:41610 protocol: tcp flags: psh,ack frag: 0  packets: 1 size: 7066 bytes ttl: 249 sample ratio: 1  
2023-07-31 12:03:06.334958 192.168.1.201:41610 > 80.249.99.148:80 protocol: tcp flags: ack frag: 0  packets: 1 size: 66 bytes ttl: 64 sample ratio: 1  
2023-07-31 12:03:06.334962 80.249.99.148:80 > 192.168.1.201:41610 protocol: tcp flags: ack frag: 0  packets: 1 size: 14066 bytes ttl: 249 sample ratio: 1  
2023-07-31 12:03:06.334966 192.168.1.201:41610 > 80.249.99.148:80 protocol: tcp flags: ack frag: 0  packets: 1 size: 66 bytes ttl: 64 sample ratio: 1  
2023-07-31 12:03:06.334970 80.249.99.148:80 > 192.168.1.201:41610 protocol: tcp flags: psh,ack frag: 0  packets: 1 size: 11266 bytes ttl: 249 sample ratio: 1  
2023-07-31 12:03:06.334975 192.168.1.201:41610 > 80.249.99.148:80 protocol: tcp flags: ack frag: 0  packets: 1 size: 66 bytes ttl: 64 sample ratio: 1  
2023-07-31 12:03:06.334979 80.249.99.148:80 > 192.168.1.201:41610 protocol: tcp flags: ack frag: 0  packets: 1 size: 1466 bytes ttl: 249 sample ratio: 1  
2023-07-31 12:03:06.334983 80.249.99.148:80 > 192.168.1.201:41610 protocol: tcp flags: ack frag: 0  packets: 1 size: 21066 bytes ttl: 249 sample ratio: 1  
2023-07-31 12:03:06.334987 192.168.1.201:41610 > 80.249.99.148:80 protocol: tcp flags: ack frag: 0  packets: 1 size: 66 bytes ttl: 64 sample ratio: 1  
2023-07-31 12:03:06.334990 80.249.99.148:80 > 192.168.1.201:41610 protocol: tcp flags: psh,ack frag: 0  packets: 1 size: 16866 bytes ttl: 249 sample ratio: 1  
2023-07-31 12:03:06.334995 192.168.1.201:41610 > 80.249.99.148:80 protocol: tcp flags: ack frag: 0  packets: 1 size: 66 bytes ttl: 64 sample ratio: 1  


Flow dump

Incoming

TCP flows: 1
192.168.1.201:41610 < 80.249.99.148:80 39387866 bytes 3101 packets


Outgoing

TCP flows: 1
192.168.1.201:41610 > 80.249.99.148:80 178596 bytes 2706 packets

from fastnetmon.

przemeksw avatar przemeksw commented on June 3, 2024

Works great.
Thanks for fast reaction !

from fastnetmon.

pavel-odintsov avatar pavel-odintsov commented on June 3, 2024

from fastnetmon.

przemeksw avatar przemeksw commented on June 3, 2024

No problem.
Please write more, because I have not found such information anywhere.
Does the fastnetmon community have any advanced attack detection or is it all based on pps and bandwidth overruns?

from fastnetmon.

pavel-odintsov avatar pavel-odintsov commented on June 3, 2024

FastNetMon Advanced has multiple exclusive detection methods not available in community edition such as: https://fastnetmon.com/docs-fnm-advanced/flexible-thresholds/ or https://fastnetmon.com/docs-fnm-advanced/per-hostgroup-thresholds/ but all of them are thresholds based. To help with baselines Advanced edition has baseline recommendation tool in place: https://fastnetmon.com/docs-fnm-advanced/automated-baseline-calculation-with-fastnetmon-advanced/

from fastnetmon.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.