Answer the question
In order to leave comments, you need to log in
How can I catch incoming connections with socks5 in Debian?
Actually a subject.
There is a certain personality that often messes with the Sox.
Is it possible to somehow track that the connection comes directly from the socks and immediately ban the villain?
Answer the question
In order to leave comments, you need to log in
From your question, the connection scheme is not clear (how the client connects to socks and at what point you have the opportunity to monitor traffic). Without this adequate answer, you will not receive, but only “finger in the sky” you can poke, dream up what and how
OK.
There is a certain server (it lives by itself), let there be a Web server with open port 80.
There is an attacker whose ip is banned from iptables. An attacker sets up a connection via socks5 on his machine (via a program or in a browser) and gets to the server on port 80. because ip soks not in the bath.
How can you determine whether the client is sitting through socks or is breaking from his ip?
In addition to port 80, there are also other services in which cookies will not help.
e.g. dc++ hub
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question