A security analyst is diagnosing an incident in which a system was compromised from an external IP address.
The socket identified on the firewall was traced to 207.46.130.0:6666
Which of the following should the security analyst do to determine if the compromised system still has an active connection?
Click on the arrows to vote for the correct answer
A. B. C. D.B.
The appropriate tool for determining if a compromised system still has an active connection to the external IP address identified by the firewall is netstat
.
Netstat
(short for network statistics) is a command-line tool used to display active network connections and their status, as well as other network-related information. It provides detailed information about TCP and UDP connections, including the source and destination IP addresses, port numbers, and the status of the connection.
To determine if the compromised system still has an active connection to the external IP address, the security analyst can use the following steps:
netstat -an
and press enter. This will display a list of all active connections on the system, including those to external IP addresses.netstat
command.In summary, the correct tool for determining if a compromised system still has an active connection to an external IP address is netstat
. The security analyst can use the netstat -an
command to display active network connections and look for the IP address and port number identified by the firewall.