Solved

Find process making outbound connections

Posted on 2014-03-09
5
486 Views
Last Modified: 2014-03-19
I have a system which is repeatedly trying to make an outbound connection on port 4343. Judging from the pcap I took from the perimeter firewall, the connection is never fully established. It attempts the same public IP for each connection attempt.

I have since made sure this port outbound is not allowed.

Anyhow, I see the system still attempts connections as it is filling up my Deny logs. What is the best way to find out what process on this system is attempting this connection? I have tried TCPView and Currports but neither show this activity. I am not sure if those only show it once the connection is established or not. I also do not see anything from netstat -ano.
0
Comment
Question by:Schuyler Dorsey
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 10

Author Comment

by:Schuyler Dorsey
ID: 39915868
The public IP is 150.1.1.2 and appears to be in Japan.
0
 
LVL 15

Accepted Solution

by:
ZabagaR earned 500 total points
ID: 39916031
Microsoft Network Monitor 3.4 will capture and can sort connections by the .exe that initiates the connection.

http://www.microsoft.com/en-us/download/details.aspx?id=4865
0
 
LVL 2

Expert Comment

by:IMGIDC
ID: 39922969
did you try to use
netstat
!!!
0
 
LVL 10

Author Comment

by:Schuyler Dorsey
ID: 39925225
Netstat did not show it. The MS Network Monitor showed it was Console.exe which is the built in SBS console. I have not seen this behavior before.
0
 
LVL 63

Expert Comment

by:btan
ID: 39928226
First to make sure the IP of the target machine is the actual machine to make sure it is not NAT or when through some proxy. Supposedly, running netstat -a -n -o (or netstat -a -b) and it will lead to PID and then the process. Note that the Process Identifier in the Task Manager is not turned on by default.

another useful tool is processhacker which will try to reveal hidden process and rootkit, including see the network connections used by a process and display port, protocol, remote/local IP connections including PID and status of a process (whether it’s listening or not).
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
RDP Sonicwall 8 107
Cisco 5508 controller parsing error 4 109
Comcast Static IP Addresses 13 241
Guest Wireless in a Business Environment 6 149
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question