Chuyển đến nội dung chính

[ iftop ] A Network Bandwidth Monitoring Tool for Linux


iftop is used to view the current bandwidth on a network interface. It listens to network traffic on a named interface and displays a table of current bandwidth usage by pairs of hosts. iftop must be run by a root user or a user who has sufficient privileges to monitor network bandwidths.
Installing iftop
On Debian/Ubuntu:
sk@sk:~$ sudo apt-get install iftop
On CentOS/RHEL:
iftop will not be found in official repositories. So let us add EPEL repository to install iftop:
[root@server ~]# rpm -ivh http://dl.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm
Now install it using the following command:
[root@server ~]# yum install iftop
Usage
iftop is very simple to use. Just type the iftop command on terminal with root privileges to display the bandwidth usage of the first network interface. Press to exit from the iftop command output.
[root@server ~]# iftop
root@server_001
To view the source and destination listening ports, just press SHIFT+S and SHIFT+D. It will display the traffic along with source and destination ports.
root@server_007
To view the network bandwidth of a particular interface, use the following command.
[root@server ~]# iftop -i eth0
root@server_002
By default, iftop will display all traffic in kilo/mega/giga bits per second. To display all traffic in bytes instead of bits the parameter -B (Capital B).
[root@server ~]# iftop -i eth0 -B
root@server_003
To display the traffic on which port is occurring, use -P and -N switches with iftop command.
[root@server ~]# iftop -i eth0 -P -N
The parameter -N displays the port number.
root@server_004
To view the in and out packet flowing of a network, use the following command.
 [root@server ~]# iftop -F 192.168.1.0/24
For more information about iftop command, refer the man pages using the following command:


[root@server ~]# man iftop

Nhận xét

Bài đăng phổ biến từ blog này

Fake WiFi Access Point

Evil Twin Methodology Step 1 : We will first scan the air for a target access point. Then create an access point using airbase-ng with the same name and channel of the target access point, hence Evil- TWIN. Step 2 :The client is now disconnected repeatedly from the  original access point and as most modern system’s setting says… “Connect back to same ESSID(AP name) if disconnects”. This also happens because when the client disconnects from any access point it starts sending  probe requests  in the air with the name of the access point it connected to earlier. Hence  BSSID  isn’t a barrier, you just need  ESSID  to spoof the AP Step 3 : Clients is now connected to the Fake WiFi access point and now client may start browsing Internet. Step 4 : Client will see a web administrator warning saying “Enter WPA password to download and upgrade the router firmware” Step 5 : The moment client enters the password, s/he will be redirected to a loading ...

Cấm chạy ứng dụng – file exe trong Windows

Đôi khi vì 1 lý do nào đó, chúng ta muốn ngăn chặn người khác mở 1 chương trình hoặc chặn không cho virus thực thi file .exe, có thể lên danh sách các ứng dụng được pháp chạy hoặc không thông qua chế độ quản lý quyền hạn Group Policy (Có trên các phiên bản Windows Pro, Enterprise, Ultimate) Hoặc đơn giản hơn là can thiệp vào các khóa Registry, cách này đòi hỏi bạn phải truy cập vào Registry và tạo các khóa cần thiết.     Chú ý:  TIP này áp dụng cho hệ điều hành Windows. Các thao tác này thực hiện có tác động đến Registry, vì vậy hãy thật cẩn thận! 1. Tạo rule cấm. Mở hộp thoại Run từ Start Menu hoặc nhấn tổ hợp phím  Windows + R  (Cần phải chạy trên quyền Administrator) Gõ vào  regedit.exe  và Enter để khởi chạy chương trình  Registry Editor . Truy cập vào đường dẫn: 1 HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer Tạo 1 khóa  DWORD 32-bit  tên là  Disallo...

How to add official Kali Linux Repositories? – Kali Linux 2.x Sana repositories

Edit your sources.list The easiest way is to edit the  /etc/apt/sources.list root@kali:~# vi /etc/apt/sources.list (or) root@kali:~# leafpad /etc/apt/sources.list Add official repo’s only: Copy paste the following repositories (remove existing lines or you can comment them out – your take). Following repo list was taken from official  Kali sources.list Repositories  page: # Regular repositories deb http://http.kali.org/kali sana main non-free contrib deb http://security.kali.org/kali-security sana/updates main contrib non-free # Source repositories deb-src http://http.kali.org/kali sana main non-free contrib deb-src http://security.kali.org/kali-security sana/updates main contrib non-free Save and close the file. Clean your apt-get apt-get clean Do an apt-get update apt-get update Do an upgrade apt-get upgrade Finally do a distribution upgrade apt-get dist-upgrade That’s it, you’re set. Conclusion A bit of caution for  Kali Linux 2.0 Ka...