OS Security
--
Questions
--
Followers
Top Experts
thanks !
Active Connections:
Proto Local Address Foreign Address State
TCP server2:epmap server2:0 LISTENING
TCP server2:microsoft-ds server2:0 LISTENING
TCP server2:1279 server2:0 LISTENING
TCP server2:1280 server2:0 LISTENING
TCP server2:1741 server2:0 LISTENING
TCP server2:5000 server2:0 LISTENING
TCP server2:netbios-ssn server2:0 LISTENING
UDP server2:microsoft-ds *:*
UDP server2:isakmp *:*
UDP server2:1029 *:*
UDP server2:1098 *:*
UDP server2:1099 *:*
UDP server2:1332 *:*
UDP server2:6500 *:*
UDP server2:13139 *:*
UDP server2:netbios-ns *:*
UDP server2:netbios-dgm *:*
UDP server2:1900 *:*
UDP server2:1118 *:*
UDP server2:1353 *:*
UDP server2:1900 *:*
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
TO find out what ports are open/exposed do the following
Start >Run >type "cmd" {enter}
At the command line type "netstat -a" {enter}
The list displayed shows "Listening ports" and established "Who is on the other end" connections to yout computer.
WARNING
This is a list of common Trojan/Backdoor Port numbers
http://www.sans.org/resources/idfaq/oddports.php
Who is listening? Use this syntax: netstat -an |find /i "listening"
Save who is listening to a text file: netstat -an |find /i "listening" > c:\openports.txt
Who is established? Use this syntax: netstat -an |find /i "established"
Note: In Windows XP, you can type NETSTAT -O to get a list of all the owning process ID associated with each connection: netstat -ao |find /i "listening"
*****Pulist*****
You can use PULIST from the W2K Resource Kit to find the PID and see what process uses it and who started it. For example, you found out that your computer had an open connection to a remote IP address on TCP port 80, and you don't have any Internet Explorer or other browser windows open. You want to find out what process is using that session.
Download: http://www.microsoft.com/windows2000/techinfo/reskit/tools/existing/pulist-o.asp
*****Links*****
Port Assignments for Commonly-Used Services
http://www.microsoft.com/windows2000/techinfo/reskit/samplechapters/cnfc/cnfc_por_simw.asp
TCP/UDP Ports Used By Exchange 2000 Server
http://support.microsoft.com/default.aspx?scid=kb;en-us;278339
Nice shiny Port List :0)
http://hackerwhacker.com/portslist.html
http://www.incubus.co.uk/os/windows/netstat.htm
http://www.petri.co.il/quickly_find_local_open_ports.htm
*****Portscan Software*****
Scan Yourself (Free)
Scan your Ports with Port Detective: lets you scan your PC ports to see which are open, in use, or blocked. This will help you find out how vulnerable your system is to hackers, and will also let you know which ports you can use for applications such as Web servers
http://www.portdetective.com/
Scan Remote COmputers (Free)
Advanced port scanner is a small, fast, robust and easy-to use port scanner for Win32 platform. It uses a multithread technique, so on fast machines you can scan ports very fast. Also, it contains descriptions for common ports, and can perform scans on predefined port ranges. You can use it for FREE. Download now!
http://www.antivirus.com.au/radmin/famatech_nu/portscanner.htm
It enables you to monitor all open TCP and UDP ports on the local computer. Active Ports maps ports to the owning application so you can watch which process has opened which port. It also displays a local and remote IP address for each connection and allows you to terminate the owning process. Active Ports can help you to detect trojans and other malicious programs.
It is a small proggie 475k but very usefull.
http://www.protect-me.com/freeware.html
Those programs are great solving what program has opened ports but I have also used program called LanGuard. Best part of that program is that it gives quite easy to read results. When Languard finds something suspicious it gives human readable information :)
You can find demo from here:
http://www.gfi.com/lannetscan/






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Next think you should do is to figure out which services you have running that you dont acctually use, go to control panel, administrative tools, services..or just click start -> run -> services.msc <ENTER>
Do you use remote registry? if not and if non of your programs uses it, then disable it.
Try netstat -ano again, look up the PID nr. press CTRL ALT DEL, go to taskmanager, add the PID field.
That way you can see which program uses or listens to which port number
Now you can clerify more accurate which ports you should allow and which you shouldn't.
I suggest using a router to connect to the internet which has somekind of packet filtering, so you can control which packets you want to allow on your LAN and which packets you allow to access the WAN interface. If you want to host services/servers then make sure it has somekind of port forwarding, where you can direct incomming ports to a destination on your LAN.
http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/vision.htm
This will show you what process/exe is running the port.
Nathan
The one thing that does sort of look suspecious is the high end ports. Windows does not use any ports that are over 65535 for its general purposes. So, if there are ports like 130000 etc. then you should be cautions for which it could possibly be a trojan or some sort of keylogger / spyware.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
because of that fact it's not possible to have a port above 65535 so what you have written "So, if there are ports like 130000" is quite ridiculous (;
OS Security
--
Questions
--
Followers
Top Experts
Operating system security (OS security) is the process of ensuring OS integrity, confidentiality and availability. OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions. OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised, including authentication, passwords and threats to systems and programs.