Solved

Find port of software

Posted on 2006-06-20
9
432 Views
Last Modified: 2013-12-07
I have a piece of software that is going out to a server looking for licensing.  While this is fine and dandy, the manufacturer of the software has basically disappered, but the software still works, providing I allow my firewall to have ALL ports open.  Thus, I am looking for a monitoring device or piece of software to simply run and tell me when the software is being used, what port number is being called.  I have tried some MS tools like NetStat with no help.
0
Comment
Question by:chrisryhal
9 Comments
 
LVL 8

Accepted Solution

by:
Marakush earned 85 total points
ID: 16946685
http://www.ethereal.com

You might have to install wincap with it the instructions are on the site. I would suggest shutting everything down and starting the software you need to find the port of.

Also you might want to try a firewall software like blackice, turn on your software and it will tell you program XXX is trying to access the internet and look at the details of what port it is trying to use.

Marakush
0
 
LVL 12

Assisted Solution

by:fruhj
fruhj earned 83 total points
ID: 16946795
Winternals has a utility that will show open endpoints of software, and it doesn't require any special drivers.
http://www.sysinternals.com/Utilities/TcpView.html
0
 
LVL 10

Assisted Solution

by:ISoul
ISoul earned 83 total points
ID: 16946879
May I suggest Active Ports?

http://www.snapfiles.com/get/activeports.html
0
Save on storage to protect fatherhood memories

You're the dad who has everything. This Father's Day, make sure your family memories are protected. My Passport Ultra has automatic backup and password protection to keep your cherished photos and videos safe. With up to 3TB, you have plenty of room to hold the adventures ahead.

 
LVL 43

Assisted Solution

by:Steve Knight
Steve Knight earned 83 total points
ID: 16947066
netstat -an from a command prompt does tell you what is going on at the moment.  Ethereal is great stuff and armed with a packet trace you can see exactly goes on between the devices, or you can use Network monitor or install a personal firewall such as Zone Alarms or Tiny firewall.

0
 
LVL 43

Expert Comment

by:Steve Knight
ID: 16947089
If you have XP try netstat -anbv and look for the PID of your application (see task manager) and it will also show you the modules which are using the ports...
0
 
LVL 57

Assisted Solution

by:giltjr
giltjr earned 83 total points
ID: 16947678
Umm does your firewall log all traffic that it denies?  If so check out the log.  Otherwise a packet capture utility like Ethereal, or its replacement Wireshark (http://www.wireshark.org) running on the computer that is running the software.
0
 
LVL 77

Assisted Solution

by:Rob Williams
Rob Williams earned 83 total points
ID: 16948217
To elaborate on netstat, using    netstat  -b     at a command line with return a list of TCP connections and their state.
Run the application with the firewall disabled. Then run   netstat  -b   look for "ESTABLISHED" connections. On the line below it will show the application such as [Outlook.exe] that has the connection. You can then look under Local Address and Foreign address for that connection and the connected local and foreign ports will be displayed as
 Computername : port #
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now