Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Find process making outbound connections

Posted on 2014-03-09
5
Medium Priority
?
527 Views
Last Modified: 2014-03-19
I have a system which is repeatedly trying to make an outbound connection on port 4343. Judging from the pcap I took from the perimeter firewall, the connection is never fully established. It attempts the same public IP for each connection attempt.

I have since made sure this port outbound is not allowed.

Anyhow, I see the system still attempts connections as it is filling up my Deny logs. What is the best way to find out what process on this system is attempting this connection? I have tried TCPView and Currports but neither show this activity. I am not sure if those only show it once the connection is established or not. I also do not see anything from netstat -ano.
0
Comment
Question by:Schuyler Dorsey
5 Comments
 
LVL 10

Author Comment

by:Schuyler Dorsey
ID: 39915868
The public IP is 150.1.1.2 and appears to be in Japan.
0
 
LVL 15

Accepted Solution

by:
ZabagaR earned 2000 total points
ID: 39916031
Microsoft Network Monitor 3.4 will capture and can sort connections by the .exe that initiates the connection.

http://www.microsoft.com/en-us/download/details.aspx?id=4865
0
 
LVL 2

Expert Comment

by:IMGIDC
ID: 39922969
did you try to use
netstat
!!!
0
 
LVL 10

Author Comment

by:Schuyler Dorsey
ID: 39925225
Netstat did not show it. The MS Network Monitor showed it was Console.exe which is the built in SBS console. I have not seen this behavior before.
0
 
LVL 65

Expert Comment

by:btan
ID: 39928226
First to make sure the IP of the target machine is the actual machine to make sure it is not NAT or when through some proxy. Supposedly, running netstat -a -n -o (or netstat -a -b) and it will lead to PID and then the process. Note that the Process Identifier in the Task Manager is not turned on by default.

another useful tool is processhacker which will try to reveal hidden process and rootkit, including see the network connections used by a process and display port, protocol, remote/local IP connections including PID and status of a process (whether it’s listening or not).
0

Featured Post

[Webinar] Cloud Security

In this webinar you will learn:

-Why existing firewall and DMZ architectures are not suited for securing cloud applications
-How to make your enterprise “Cloud Ready”, and fix your aging DMZ architecture
-How to transform your enterprise and become a Cloud Enabler

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
In this article, we’ll look at how to deploy ProxySQL.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

972 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question