- The Funk Blog
- The profound rantings of the one like Tom Atkinson… and now art gallery and shop.
- netstat macos Show Listening Ports TCP Sockets with Grep
- Show Server Port and Process ID in Netstat Mac
- About Netstat
- Pipe netstat Into Grep To Remove Junk From The End
- The Little Snitch Command — Who’s phoning home?
- Linux Equivalent
- Ports Open (Networking)
- Ports
- Spotlight on Network Utility to List Ports
- List open files = lsof
- Protocols
- Processes Tour
- For a list of processes on Mac:
- Resources
- Honeypots
- How to Use the Netstat Command on Mac
- See open ports and those in use
- What to Know
- How to Run Netstat
- Netstat Flags and Options
- Syntax
- Useful Flags
- Netstat Examples
- Accessing Netstat Through Network Utility
- Supplementing Netstat With Lsof
- Lsof Flags and Options
- lsof Examples
- Other Networking Commands
The Funk Blog
The profound rantings of the one like Tom Atkinson… and now art gallery and shop.
netstat macos Show Listening Ports TCP Sockets with Grep
Show only servers — that is ports that are listening waiting for an inbound connection:
netstat -Waltn | grep LISTEN
Show Server Port and Process ID in Netstat Mac
Instead of netstat you need to use LSOF (lists open files and sockets), piped into grep which will only shows lines with LISTEN in them:
sudo lsof -Pnl +M -i | grep LISTEN
Use -i4 for ip4 and -i6 for ip6. -i seems to work for all internet traffic. Handy for tracking down what program is running a server on your machine.
About Netstat
If you’re looking to list open network ports the Mac equivalent to the linux command netstat -Walntpc might be what you’re after. You are not alone, I get about 6,000 unique visitors per year here! Realtime list of all open connections and listening sockets: watch netstat -Walnt (No DNS much faster) watch netstat -Walt (with DNS lookups) The beauty of this command is that it gets you past that over long list of (non-internet surely?) unix sockets and kexts, why Apple put this into netstat I have no idea, perhaps the blame is with Darwin BSD kernel. But it should be more like Linux netstat in my opinion! That’s because I can even see the process names and get continuous updates my adding pc with
Pipe netstat Into Grep To Remove Junk From The End
Listening socket / server processes ports macOS quickly: netstat -Waltn | grep tcp Every internet port fast with no DNS lookups: netstat -Waltn | grep -E «(tcp|udp)(4|6)» Like above but with DNS lookups but takes literally forever up to minutes: netstat -Walt | grep -E «(tcp|udp)(4|6)»
The Little Snitch Command — Who’s phoning home?
How to use LSOF to discover which app or process is listening to which ports: lsof -Pnl +M -i -cmd | grep -E «LISTEN|TCP|UDP» I prefer to use -n to speed up the listing of netstat results by turning off DNS lookups ip to name resolution. The l is used to also show ipv6. To show all internet connections, whether ipv4 or ipv6, tcp or udp, listening, connected or closing — the lot: netstat -Waltn | grep p[46] Show only TCP connections: netstat -anp tcp To see which apps have listening sockets open: sudo lsof -n -P | grep LISTEN Some other good linux ones here: http://www.commandlinefu.com/commands/matching/netstat/bmV0c3RhdA==/sort-by-votes
Linux Equivalent
This one is good for checking ssh tunnels: sudo netstat -tulpn
Posted by tomachi on January 12th, 2016 filed in Mac, Unix
Источник
Ports Open (Networking)
What ports are open for hacking on my Mac and Linux machine?
Here is how to see what ports are open listening on a server.
This is perhaps the most important potential vulnerability.
Having ports listenting to outside traffic also takes CPU effort, which consumes electricity and thus reduce battery life.
Ports
PAT (Port Address Translation) maps ports.:
- 0 — 1023 = well-know ports
- 1024 — 49141 = Registered ports (1433 for MS SQL, 1431 for Oracle SQL, etc.)
- 49152 — 54535 65535 = dynamic ports
Port 3389 is used for communicating with Microsoft’s RDP (Remote Desktop Protocol) on Windows machines. See My notes on Windows RDP.
Common TCP Ports in layer 4: REMEMBER
- 80/443 = HTTPS (Secure, encrypted)
21/990 = FTP and FTPS which adds SSL & TLS to encrypt
3389 = RDP (Remote Desktop Protocol) from Microsoft
143/993 = IMAP (Internet Message Access Protocol) files remain on server / TLS
No port for ICMP RFC 792 Pings RFC 1122 as it’s in IP transport layer
- 8080, 8081 = Limits Microservice
- 8888 = Spring Cloud Config server
- 8000,8001,8002,… = Currency Exhange Microservice
- 8100,8101,8102,… = Currency Conversion Microservice
- 8761 = Netflix Eureka Naming Server
- 8765 = API Gateway
- 9411 = Zipkin Distributed Tracing Server
IP header protocol field REMEMBER
- 1 = ICMP (Internet Control Message Protocol)
- 2 = IGMP (Internet Group Management Protocol) to estab. multicaset group transmitted to at once
- 6 = TCP (Transmission Control Protocol)
- 17 = UDP (User Datagram Protocol) used by VOIP
- 115 = L2TP (Layer 2)
Spotlight on Network Utility to List Ports
Apple’s macOS Spotlight is like Window’s Search omni-box. *
Press Command+Spacebar.
Type the name of utilities that are buried, such as Network Utility.
Click the keyboard return/enter key to launch the Network Utility app.
Select the «Port Scan» tab.
Enter the IP (such as 127.0.0.1), localhost, or domain name you wish to scan for open ports.
Choose scan to see what ports the server responds to.
List open files = lsof
In a Terminal command line:
PROTIP: If you’ll be using this often, create an alias such as of .
“lsof” is a contraction for “list open files”. Without any options specifications, lsof lists all open files belonging to all active processes.
“-nP” is a combination of “n” for no resolution of IPs to hostnames using DNS and “P” for no resolution of Port names from numbers.
This is because the command already takes several seconds to run.
“+c 15” specifies command width of 15.
Piping to grep filters out only lines containing “LISTEN”.
NOTE: All options are shown by this command:
Drag your Terminal window wider to remove word-wrap.
“FD” column lists File Descriptors. “u” is for read and write mode. “r” for read only, “w” for write-only.
Linux requires root on operations for well-known ports below 1024.
Protocols
TCP (Transmission Control Protocol) is the most commonly used protocol on the Internet and any TCP/IP network. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered in the same order in which they were sent. Guaranteed communication/delivery is the key difference between TCP and UDP on ort 53.
UDP (Datagram Protocol) is connectionless and does not guarantee reliable communication; it’s up to the application that received the message to process any errors and verify correct delivery. UDP is often used with time-sensitive applications, such as audio/video streaming, where dropping some packets is preferable to waiting for delayed data.
Processes Tour
NOTE: Drag the scroll bar to see what is beyond what is displayed.
mongod is MongoDB listening on port 27017.
I should keep that closed unless I need it.
In Node, close all connections when the app closes completely:
2BUA8C4S2C
When I search for “2BUA8C4S2C” I see “2BUA8C4S2C.com.agilebits” in folder /Users/mac/Library/Group Containers
This says This port is used only on the loopback interface (127.0.0.1) for the 1Password extension to talk to the 1Password Agent. It should be safe to firewall it from any sources other than 127.0.0.1. If you do a packet capture on lo0 and then filter by tcp.port == 6258 you can see what traffic is being passed. Nothing is transmitted in the clear.
Skype I don’t mind keeping open. I use it a lot.
Dropbox — why does it need to be kept open?
I’ll use just their web page when I need it.
Resilio\x20Sync I used once to get a file.
In Resilio Preferences, uncheck “Start Resilio Sync on startup”.
SketchMirrorHel
XMPP ports 56989 and 56990
For a list of processes on Mac:
Don’t visit http://www.westwind.com/reference/OS-X/background-processes.html
ftp (tftp) should not appear.
Scan other machines
brew install nmap
(Zenmap is the GUI)
There are a lot of options
nmap -h
nmap [scan type] [options]
There are a lot of options
nmap -h
Scan for vulnerabilities using nmap scripts.
Scan for vulnerabilities using vulnerability scanners:
Scans for versions of applications and operating systems. Compare those against known vulnerabilities and exploits.
Devices on the Internet with open ports are indexed by Shodan.io.
SNR (software defined radios)
Resources
Learn basic hardware hacking with UbertoothOne and HackRF One.
Network Intrusion detection systems (NIDS)
AlienVault Open Source SIEM (OSSIM) with Open Threat Exchange (OTX) Security Information and Event Management (SIEM) software.
Honeypots
Commercial Honeypot software:
- Fortinet – FortiDeceptor
- Attivio — BOTsink
- Fidelis – Fidelis Deception
- TrapX– DeceptionGrid
- Illusive – Illusive Platform
Источник
How to Use the Netstat Command on Mac
See open ports and those in use
What to Know
- To run netstat and see detailed data about your Mac’s network, open a new Terminal window, type netstat, and press Enter.
- Limit netstat’s output with flags and options. To see netstat’s available options, type man netstat at the command prompt.
- Use the lsof command to make up for netstat’s missing or limited functionality, including displaying any files currently open in any apps.
This article explains how to run the netstat Terminal command in macOS so that you can see detailed information about your Mac’s network communications, including the ways your Mac is talking to the outside world, across all ports and all applications.
How to Run Netstat
Learning how to use netstat can help you understand the connections your computer is making and why. The netstat command is available on Macs by default. You don’t need to download or install it.
Go to Finder > Go > Utilities.
Double-click Terminal.
In the new Terminal window, type netstat and press Return (or Enter) to execute the command.
A huge amount of text will begin scrolling on your screen. If you don’t use any of the available flags (see below), netstat reports the active network connections on your Mac. Considering the number of functions a modern network device performs, you can expect the list to be lengthy. A standard report can run over 1,000 lines.
Netstat Flags and Options
Filtering netstat’s output is essential to understanding what’s happening on your Mac’s active ports. Netstat’s built-in flags allow you to set options, limiting the command’s scope.
To see all netstat’s available options, type man netstat at the command prompt to reveal netstat’s man (short for «manual») page. You can also view an online version of netstat’s man page.
Syntax
It’s important to note that netstat on macOS doesn’t work the same way as netstat on Windows and Linux. Using flags or syntax from those implementations of netstat may not result in the expected behavior.
To add flags and options to netstat on macOS, use the following syntax:
netstat [-AabdgiLlmnqrRsSvWx] [-c queue] [-f address_family] [-I interface] [-p protocol] [-w wait]
If the above shorthand looks completely incomprehensible, learn how to read command syntax.
Useful Flags
Here are some of the most commonly used flags:
- -a includes server ports in netstat’s output, which are not included in the default output.
- -g displays information associated with multicast connections.
- -Iinterface provides packet data for the specified interface. All available interfaces can be viewed with the -i flag, but en0 is typically the default outgoing network interface. (Note the lowercase letter.)
- -n suppresses the label of remote addresses with names. This speeds up netstat’s output while eliminating only limited information.
- -pprotocol lists traffic associated with a specific networking protocol. The full list of protocols is available at /etc/protocols, but the most important ones are udp and tcp.
- -r displays the routing table, showing how packets are routed around the network.
- -s shows the network statistics for all protocols, whether or not the protocols are active.
- -v increases verbosity, specifically by adding a column showing the process ID (PID) associated with each open port.
Netstat Examples
Consider these examples:
netstat -apv TCP
This command returns only TCP connections on your Mac, including open ports and active ports. It also uses verbose output, listing the PIDs associated with each connection.
netstat -a | grep -i «listen»
This combination of netstat and grep reveals open ports, which are ports that are listening for a message. The pipe character | sends the output of one command to another command. Here, the output of netstat pipes to grep, letting you search it for the keyword «listen» and find the results.
Accessing Netstat Through Network Utility
You also can access some of netstat’s functionality through the Network Utility app, which is included in macOS versions up to Catalina (it’s not included in Big Sur).
To get to Network Utility, type Network Utility into Spotlight Search to launch the app, then select the Netstat tab to access the graphical interface.
Options within Network Utility are more limited than those available through the command line. Each of the four radio button selections runs a preset netstat command and displays the output.
The netstat commands for each radio button are as follows:
- Display routing table information runs netstat -r.
- Display comprehensive network statistics for each protocol runs netstat -s.
- Display multicast information runs netstat -g.
- Display the state of all current socket connections runs netstat.
Supplementing Netstat With Lsof
The macOS implementation of netstat doesn’t include much of the functionality users expect and need. Although it has its uses, netstat isn’t as useful on macOS as it is on Windows. A different command, lsof, replaces much of the missing functionality.
Lsof displays files currently open in apps. You can also use it to inspect app-associated open ports. Run lsof -i to see the list of applications communicating over the internet. This is typically the goal when using netstat on Windows machines; however, the only meaningful way to accomplish that task on macOS is not with netstat, but with lsof.
Lsof Flags and Options
Displaying every open file or internet connection is typically verbose. That’s why lsof comes with flags for restricting results with specific criteria. The most important ones are below.
For information on more flags and technical explanations of each, check out lsof’s man page or run man lsof at a Terminal prompt.
- -i displays open network connections and the name of the process that is using the connection. Adding a 4, as in -i4, displays only IPv4 connections. Adding a 6 instead (-i6) displays only IPv6 connections.
- The -i flag also can be expanded to specify further details. -iTCP or -iUDP returns only TCP and UDP connections. -iTCP:25 returns only TCP connections on port 25. A range of ports can be specified with a dash, as it -iTCP:25-50.
- Using -i@1.2.3.4 returns only connections to the IPv4 address 1.2.3.4. IPv6 addresses can be specified in the same fashion. The @ precursor can also be used to specify hostnames in the same way, but both remote IP addresses and hostnames cannot be used simultaneously.
- -s typically forces lsof to display file size. But when paired with the -i flag, -s works differently. Instead, it allows the user to specify the protocol and status for the command to return.
- -p restricts lsof to a particular process ID (PID). Multiple PIDs can be set by using commons, such as -p 123,456,789. Process IDs can also be excluded with a ^, as in 123,^456, which would specifically exclude PID 456.
- -P disables the conversion of port numbers to port names, speeding up output.
- -n disables the conversion of network numbers to hostnames. When used with -P above, it can significantly speed up lsof’s output.
- —uuser only returns commands owned by the named user.
lsof Examples
Here are a few ways to use lsof.
lsof -nP -iTCP@lsof.itap:513
This complex-looking command lists the TCP connections with the hostname lsof.itap and the port 513. It also runs lsof without connecting names to IP addresses and ports, making the command run noticeably faster.
lsof -iTCP -sTCP:LISTEN
This command returns every TCP connection with the status LISTEN, revealing the open TCP ports on the Mac. It also lists the processes associated with those open ports. This is a significant upgrade over netstat, which lists PIDs at most.
sudo lsof -i -u^$(whoami)
Other Networking Commands
Other Terminal networking commands that might be of interest in examining your network include arp, ping, and ipconfig.
Источник