Perhaps in your haste, you missed something.

If I run netstat -anpe as a user I get this specific message and the PID
column is populated with only a "-" for all entries, just like you
showed.

I.E.

netstat -anpe |grep udp
(Not all processes could be identified, non-owned process info
 will not be shown, you would have to be root to see it all.)
udp        0      0 0.0.0.0:631             0.0.0.0:*
0          5285429     -               

see the message? 

However, running "sudo netstat -anpe |grep udp" actually displays the
PID/Binary
udp        0      0 0.0.0.0:631             0.0.0.0:*
0          5285429     3334/cupsd      


The Process ID is what you are supposed to use to match a socket to the
binary that opened it.


**Try "sudo netstat -anpeev"


You can also try to fine the inode. Though, it is a large number and you
may not find it on disk.

**Also, try "find / -inum 5950269 -print"


You might also try starting a packet capture and removing the firewall.
After a bit kill the packet capture and see what Wireshark tells you.

**"sudo tcpdump -i eth0? -nASs0 -c 500 -w `hostname`-`date +%F-%H%
M`.pcap port 10001" This will automatically stop after 500 packets
to/from port 10001.




On Wed, 2014-01-22 at 13:20 +0100, Nico Angenon wrote:
> Hello,
>  
> i think i’ve been hacked on one of my boxes... 
>  
> I try to find with process bind a specific port :
>  
> # netstat -anpe |grep udp
> gives me
> udp        0      0 0.0.0.0:10001           0.0.0.0:*
> 0          5950269     -
>  
>  
> but 
> # lsof |grep 10001
> doesn’t show me anything
>  
> i’ve  tried  to cat /proc/*/cmdline... no 10001 found
> no 10001 in ‘ps aux’
> no 10001 in ‘rpcinfo –p’
>  
> any idea ?
>  
> Thanks 
> Nico

Reply via email to