Solved

Find process making outbound connections

Posted on 2014-03-09
5
501 Views
Last Modified: 2014-03-19
I have a system which is repeatedly trying to make an outbound connection on port 4343. Judging from the pcap I took from the perimeter firewall, the connection is never fully established. It attempts the same public IP for each connection attempt.

I have since made sure this port outbound is not allowed.

Anyhow, I see the system still attempts connections as it is filling up my Deny logs. What is the best way to find out what process on this system is attempting this connection? I have tried TCPView and Currports but neither show this activity. I am not sure if those only show it once the connection is established or not. I also do not see anything from netstat -ano.
0
Comment
Question by:Schuyler Dorsey
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 10

Author Comment

by:Schuyler Dorsey
ID: 39915868
The public IP is 150.1.1.2 and appears to be in Japan.
0
 
LVL 15

Accepted Solution

by:
ZabagaR earned 500 total points
ID: 39916031
Microsoft Network Monitor 3.4 will capture and can sort connections by the .exe that initiates the connection.

http://www.microsoft.com/en-us/download/details.aspx?id=4865
0
 
LVL 2

Expert Comment

by:IMGIDC
ID: 39922969
did you try to use
netstat
!!!
0
 
LVL 10

Author Comment

by:Schuyler Dorsey
ID: 39925225
Netstat did not show it. The MS Network Monitor showed it was Console.exe which is the built in SBS console. I have not seen this behavior before.
0
 
LVL 64

Expert Comment

by:btan
ID: 39928226
First to make sure the IP of the target machine is the actual machine to make sure it is not NAT or when through some proxy. Supposedly, running netstat -a -n -o (or netstat -a -b) and it will lead to PID and then the process. Note that the Process Identifier in the Task Manager is not turned on by default.

another useful tool is processhacker which will try to reveal hidden process and rootkit, including see the network connections used by a process and display port, protocol, remote/local IP connections including PID and status of a process (whether it’s listening or not).
0

Featured Post

Supports up to 4K resolution!

The VS192 2-Port 4K DisplayPort Splitter is perfect for anyone who needs to send one source of DisplayPort high definition video to two or four DisplayPort displays. The VS192 can split and also expand DisplayPort audio/video signal on two or four DisplayPort monitors.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question