Solved

Find port of software

Posted on 2006-06-20
9
439 Views
Last Modified: 2013-12-07
I have a piece of software that is going out to a server looking for licensing.  While this is fine and dandy, the manufacturer of the software has basically disappered, but the software still works, providing I allow my firewall to have ALL ports open.  Thus, I am looking for a monitoring device or piece of software to simply run and tell me when the software is being used, what port number is being called.  I have tried some MS tools like NetStat with no help.
0
Comment
Question by:chrisryhal
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 
LVL 8

Accepted Solution

by:
Marakush earned 85 total points
ID: 16946685
http://www.ethereal.com

You might have to install wincap with it the instructions are on the site. I would suggest shutting everything down and starting the software you need to find the port of.

Also you might want to try a firewall software like blackice, turn on your software and it will tell you program XXX is trying to access the internet and look at the details of what port it is trying to use.

Marakush
0
 
LVL 12

Assisted Solution

by:fruhj
fruhj earned 83 total points
ID: 16946795
Winternals has a utility that will show open endpoints of software, and it doesn't require any special drivers.
http://www.sysinternals.com/Utilities/TcpView.html
0
 
LVL 10

Assisted Solution

by:ISoul
ISoul earned 83 total points
ID: 16946879
May I suggest Active Ports?

http://www.snapfiles.com/get/activeports.html
0
PeopleSoft Has Never Been Easier

PeopleSoft Adoption Made Smooth & Simple!

On-The-Job Training Is made Intuitive & Easy With WalkMe's On-Screen Guidance Tool.  Claim Your Free WalkMe Account Now

 
LVL 43

Assisted Solution

by:Steve Knight
Steve Knight earned 83 total points
ID: 16947066
netstat -an from a command prompt does tell you what is going on at the moment.  Ethereal is great stuff and armed with a packet trace you can see exactly goes on between the devices, or you can use Network monitor or install a personal firewall such as Zone Alarms or Tiny firewall.

0
 
LVL 43

Expert Comment

by:Steve Knight
ID: 16947089
If you have XP try netstat -anbv and look for the PID of your application (see task manager) and it will also show you the modules which are using the ports...
0
 
LVL 57

Assisted Solution

by:giltjr
giltjr earned 83 total points
ID: 16947678
Umm does your firewall log all traffic that it denies?  If so check out the log.  Otherwise a packet capture utility like Ethereal, or its replacement Wireshark (http://www.wireshark.org) running on the computer that is running the software.
0
 
LVL 77

Assisted Solution

by:Rob Williams
Rob Williams earned 83 total points
ID: 16948217
To elaborate on netstat, using    netstat  -b     at a command line with return a list of TCP connections and their state.
Run the application with the firewall disabled. Then run   netstat  -b   look for "ESTABLISHED" connections. On the line below it will show the application such as [Outlook.exe] that has the connection. You can then look under Local Address and Foreign address for that connection and the connected local and foreign ports will be displayed as
 Computername : port #
0

Featured Post

Salesforce Made Easy to Use

On-screen guidance at the moment of need enables you & your employees to focus on the core, you can now boost your adoption rates swiftly and simply with one easy tool.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question