Lab 3.1.3.4

docx

School

Western Iowa Tech Community College *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by josaurous

Report
Lab 3.1.3.4 – Linux Servers a.) It was necessary to run ps as root because some processes would not have been displayed due to them not belonging to the analyst user. b.) The process hierarchy is represented by ps through identing. d.) -t show TCP connections. -u shows UDP connections. -n uses numeric output. -a shows listening & non-listening sockets. -p show the PID of the connection owner process. d.) (cont.) No, the option order is not important.
d.) (cont.) The Layer 4 for the process on port 80 is TCP, the connection status is LISTEN, and the PID is 395. d.) (cont.) More than likely the service that is running on port 80 is a web server. e.) You can conclude that the process PID 395 is nginx by looking at the output on the last column of line 1. e.) (cont.) nginx is a powerful web server software used by hosting companies. Its main function is to be used for reverse proxying, caching, and load balancing. e.) (cont.) Process 396 being owned by http means that nginx started process 396 under http. It is common behavior since nginx runs for any client that connect to port 80. e.) (cont.) The last line is showing grep 395 because when grep 395 was used for the ps output, it was still running. Therefore, it showed up in the last line.
b.) The error was sent a web page because nginx is a web server & only speaks the HTTP protocol. c.) Using Telnet to connect to port 68 results in the connection being refused. This is because port 68 is a UDP port and since Telnet is TCP-based, it cannot connect to UDP ports. Reflection #1: The advantages of using netstat include displaying source and destination addresses, ports, and process IDs which provide a good overview of all the connections present on a computer.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Reflection #2: The advantages of Telnet include being able to quickly test and gather information about a network service. It is a safe as long as it’s not used as a remote shell.