Security Basics mailing list archives

RE: a tool like nestat


From: "dave kleiman" <dave () isecureu com>
Date: Tue, 31 Aug 2004 20:36:25 -0400

Netstat -ano will show the PID of the process listening

Or you can try http://www.sysinternals.com/ntw2k/source/tcpview.shtml 
Or
http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subconte
nt=/resources/proddesc/vision.htm



______________________________________
Dave Kleiman, CISSP, CISM, CIFI, MCSE
www.SecurityBreachResponse.com
 

-----Original Message-----
From: Juan B [mailto:juanbabi () yahoo com] 
Sent: Monday, August 30, 2004 13:10
To: security-basics () securityfocus com
Subject: a tool like nestat

Hi,

I know there is a tool more sofisticated than netstat 

that can even show me which file is listening to connections and stuff like
that.

do u know about such tool ?

thanks


                
__________________________________
Do you Yahoo!?
New and Improved Yahoo! Mail - Send 10MB messages!
http://promotions.yahoo.com/new_mail 

---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------



---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: