New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 24)
· Marcia's (CO8)
· Bill G's (CO12)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 1170
Comments: 21
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
 Forum FAQForum FAQ   SearchSearch   UsergroupsUsergroups   ProfileProfile   Login to check your private messagesLogin to check your private messages   LoginLogin   Your Favorite ForumsFavForums 

NETSTAT STUFF

 
Post new topic   Reply to topic       Computer Cops Forum Index -> General Security
View previous topic :: View next topic  
Author Message
ancee1

Trooper
Trooper



Joined: Apr 18, 2004
Posts: 18
Location: USA

PostPosted: Tue May 25, 2004 8:11 pm    Post subject: NETSTAT STUFF
Reply with quote

If I were to post my a copy of what I get when I use the netstat command, is there anyone out there who can tell me what it means? I am not used to seeing so many ports listed as active on there. I'm wondering if I need to change something. Please reply!
Back to top
View users profile Send private message
qwiyet1

Private
Private



Joined: Mar 12, 2004
Posts: 41
Location: USA

PostPosted: Wed May 26, 2004 1:33 pm    Post subject:
Reply with quote

Can I suggest you go to www.sysinternals.com and get a copy of tcpview (a better tool than netstat) to view your open ports.
Run tcpview before and then after you connect online. After you run each tcpview save it as a file (beforelan, afterlan) you can open it and search websites for the use of the ports you are running. I use Symantec site to search tcp / udp ports for possible virus/worm/hacker use.
Back to top
View users profile Send private message Visit posters website
ancee1

Trooper
Trooper



Joined: Apr 18, 2004
Posts: 18
Location: USA

PostPosted: Thu May 27, 2004 9:29 pm    Post subject:
Reply with quote

thanks, qwiyet1. I did get tcpview but there are still things showing up on there that I don't understand. I appreciate your help though.
Back to top
View users profile Send private message
qwiyet1

Private
Private



Joined: Mar 12, 2004
Posts: 41
Location: USA

PostPosted: Fri May 28, 2004 9:28 am    Post subject:
Reply with quote

If you would like, cut and paste your tcpview (or attach file) - I'll see if I can explain some of it.
Back to top
View users profile Send private message Visit posters website
ancee1

Trooper
Trooper



Joined: Apr 18, 2004
Posts: 18
Location: USA

PostPosted: Mon May 31, 2004 7:56 pm    Post subject:
Reply with quote

You are very kind to do that for me! Thanks!
Here's what it looked like when I was not connected to the internet. I blocked traffic with my Norton Internet Security.

ALG.EXE:1416 TCP Home:3001 Home:0 LISTENING
ccApp.exe:500 TCP Home:3006 Home:0 LISTENING
CCPXYSVC.EXE:1428 TCP Home:1027 Home:0 LISTENING
LSASS.EXE:708 UDP Home:isakmp *:*
MSMSGS.EXE:3720 TCP home:14325 Home:0 LISTENING
MSMSGS.EXE:3720 UDP Home:3018 *:*
MSMSGS.EXE:3720 UDP home:7925 *:*
MSMSGS.EXE:3720 UDP home:25608 *:*
SVCHOST.EXE:1040 UDP Home:3022 *:*
SVCHOST.EXE:1056 TCP Home:5000 Home:0 LISTENING
SVCHOST.EXE:1056 UDP Home:1900 *:*
SVCHOST.EXE:1056 UDP home:1900 *:*
SVCHOST.EXE:880 TCP Home:epmap Home:0 LISTENING
SVCHOST.EXE:904 TCP Home:1025 Home:0 LISTENING
SVCHOST.EXE:904 TCP Home:3152 Home:0 LISTENING
SVCHOST.EXE:904 TCP Home:3157 Home:0 LISTENING
SVCHOST.EXE:904 TCP Home:3002 Home:0 LISTENING
SVCHOST.EXE:904 TCP Home:3003 Home:0 LISTENING
SVCHOST.EXE:904 TCP Home:3152 localhost:1027 CLOSE_WAIT
SVCHOST.EXE:904 UDP Home:ntp *:*
SVCHOST.EXE:904 UDP home:ntp *:*
System:4 TCP Home:microsoft-ds Home:0 LISTENING
System:4 TCP Home:1028 Home:0 LISTENING
System:4 TCP home:netbios-ssn Home:0 LISTENING
System:4 UDP Home:microsoft-ds *:*
System:4 UDP home:netbios-ns *:*
System:4 UDP home:netbios-dgm *:*


Here's what it looked like after I connected and pulled up this page.

[System Process]:0 TCP Home:1027 localhost:4443 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4445 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4447 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4449 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4451 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4453 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4455 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4457 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4477 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4464 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4489 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4491 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4493 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4495 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4499 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4501 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4503 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4505 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4507 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4508 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4511 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4515 TIME_WAIT
[System Process]:0 TCP Home:1027 localhost:4517 TIME_WAIT
ALG.EXE:1416 TCP Home:3001 Home:0 LISTENING
ccApp.exe:500 TCP Home:3006 Home:0 LISTENING
CCPXYSVC.EXE:1428 TCP Home:1027 Home:0 LISTENING
IEXPLORE.EXE:4088 UDP Home:4442 *:*
LSASS.EXE:708 UDP Home:isakmp *:*
MSMSGS.EXE:3720 TCP home:14325 Home:0 LISTENING
MSMSGS.EXE:3720 UDP Home:3018 *:*
MSMSGS.EXE:3720 UDP home:7925 *:*
MSMSGS.EXE:3720 UDP home:40904 *:*
SVCHOST.EXE:1040 UDP Home:3022 *:*
SVCHOST.EXE:1056 TCP Home:5000 Home:0 LISTENING
SVCHOST.EXE:1056 UDP Home:1900 *:*
SVCHOST.EXE:1056 UDP home:1900 *:*
SVCHOST.EXE:880 TCP Home:epmap Home:0 LISTENING
SVCHOST.EXE:904 TCP Home:1025 Home:0 LISTENING
SVCHOST.EXE:904 TCP Home:3152 Home:0 LISTENING
SVCHOST.EXE:904 TCP Home:3157 Home:0 LISTENING
SVCHOST.EXE:904 TCP Home:3002 Home:0 LISTENING
SVCHOST.EXE:904 TCP Home:3003 Home:0 LISTENING
SVCHOST.EXE:904 TCP Home:3152 localhost:1027 CLOSE_WAIT
SVCHOST.EXE:904 UDP Home:ntp *:*
SVCHOST.EXE:904 UDP home:ntp *:*
System:4 TCP Home:microsoft-ds Home:0 LISTENING
System:4 TCP Home:1028 Home:0 LISTENING
System:4 TCP home:netbios-ssn Home:0 LISTENING
System:4 UDP Home:microsoft-ds *:*
System:4 UDP home:netbios-ns *:*
System:4 UDP home:netbios-dgm *:*
YPager.exe:2948 TCP Home:4164 Home:0 LISTENING
YPager.exe:2948 TCP home:4164 cs5.msg.dcn.yahoo.com:5050 ESTABLISHED
YPager.exe:2948 TCP Home:5101 Home:0 LISTENING

Thanks so much for your time!
Back to top
View users profile Send private message
guyvermatt

Cadet
Cadet



Joined: Jun 02, 2004
Posts: 7
Location: USA

PostPosted: Wed Jun 02, 2004 10:52 am    Post subject:
Reply with quote

http:\\www.computerhope.com/msdos.htm



has alot of command.com /network commands
Back to top
View users profile Send private message Send email AIM Address
guyvermatt

Cadet
Cadet



Joined: Jun 02, 2004
Posts: 7
Location: USA

PostPosted: Wed Jun 02, 2004 10:53 am    Post subject:
Reply with quote

http:\\www.computerhope.com/msdos.htm



has alot of command.com /network commands
Back to top
View users profile Send private message Send email AIM Address
qwiyet1

Private
Private



Joined: Mar 12, 2004
Posts: 41
Location: USA

PostPosted: Fri Jun 04, 2004 12:47 pm    Post subject:
Reply with quote

trouble accessing site - give a moment to review. The only thing that jumps out is the established connection to Yahoo (I take it yahoo messenger?).
Try going to www.iana.org/assignments/port-numbers for a list of the know tcp/udp ports in use. AV provider websites at times provide a similar list but they list the ports most likely used for viruses, backdoors and trojans.
Back to top
View users profile Send private message Visit posters website
virus_guy

Trooper
Trooper



Joined: Apr 16, 2004
Posts: 31
Location: Pakistan

PostPosted: Fri Jun 04, 2004 6:17 pm    Post subject:
Reply with quote

I think you should just read an article or two on ports and networking...it was just like a week ago when all this ports stuff looked like gibberish to me...but now i pretty much understand most of this;).Anyways..you can put the output of the netstat command in a file using the following command:
netstat>C:\filename.txt
Here,instead of C:\filename.txt you could write another path name and file name.I hope that helps:)

_________________
Website=coming soon.
Back to top
View users profile Send private message MSN Messenger
Mosaic1

Site Moderator
Site Moderator



Joined: Jan 15, 2004
Posts: 4936
Location: USA

PostPosted: Sun Jun 06, 2004 9:26 pm    Post subject:
Reply with quote

Merijn wrote a nice page explaining how to interpret results. Its a start .

http://www.geocities.com/merijn_belleko...tatan.html

Once you have interpreted your report, then you can check out the information which may be problematic.


One thing which will hold ports open is services. Many are needed, but many are not and should be stopped because of the security risks they can pose.
Check out your services first and close some of those ports by not loading anything you don't need Looks like you run XP?

Remember to be careful here. Services are essential to the operating system. Stop or disable the wrong one and you may not be able to boot into Windows.
http://blackviper.com/WinXP/servicecfg.htm
Back to top
View users profile Send private message
ancee1

Trooper
Trooper



Joined: Apr 18, 2004
Posts: 18
Location: USA

PostPosted: Sun Jun 06, 2004 10:48 pm    Post subject:
Reply with quote

Thanks Mosaic 1! That article was very helpful!

Yes, I run XP. I noticed in that article that you should only worry about the UDP connections if they don't have a TCP twin. Only one of mine has a TCP twin. The others have *:* beside it. I may have overlooked it, but I didn't see what you do in that case. He has "who cares" by such ports when he interpreted the netstat results on the example though.

I know I'm not supposed to, but I'd like to PM you with another security-related question. You can PM me and let me know if it's okay. Thanks!
Back to top
View users profile Send private message
Display posts from previous:   
Post new topic   Reply to topic       Computer Cops Forum Index -> General Security All times are GMT - 5 Hours
Page 1 of 1

 
 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB 2.0.8a © 2001 phpBB Group

Version 2.0.6 of PHP-Nuke Port by Tom Nitzschner © 2002 www.toms-home.com
Version 2.2 by Paul Laudanski © 2003-2004 Computer Cops