are there any tools that can give 
take a normal netstat -a from a windows 2000 machine for example

 TCP    lee:1093               lee:0                  LISTENING
 TCP    lee:1097               lee:0                  LISTENING
 TCP    lee:netbios-ssn        lee:0                  LISTENING
 TCP    lee:1071               lee:0                  LISTENING
 TCP    lee:1071               NEXUS:netbios-ssn      ESTABLISHED
 TCP    lee:1073               lee:0                  LISTENING
 UDP    lee:epmap              *:*
 UDP    lee:microsoft-ds       *:*
 UDP    lee:1028               *:*
 UDP    lee:1087               *:*
 UDP    lee:1088               *:*
 UDP    lee:1094               *:*
 UDP    lee:1095               *:*
 UDP    lee:4692               *:*
 UDP    lee:1033               *:*
 UDP    lee:1099               *:*
 UDP    lee:netbios-ns         *:*
 UDP    lee:netbios-dgm        *:*
 UDP    lee:isakmp             *:*


are there any tools, that can track what application/users have open/listen
on port's.
example,
you have a user login as fred , that open a telnet session to a host call
lawnmower

what I wan't to see is,

TCP    lee:1071               lawnmower:25                  ESTABLISHED
'fred'  'telnet.exe'

for example, I know netstat -a return a hell of a lot more information on
unix
about streams etc etc, but surely the o/s 'knows' which applications/users 
have connections open or listing for a connection? port  on the tcp/ip
stack???

is this possible, or am I going crazy,it is some netstat parameter I've
missed
all these years...

why do need this, take for example a unsophisticated trojan, easy to spot
using this
method

TCP    lee:1071               hackerinrussia:25  ESTABLISHED    'root'
'trojan.exe'

Any idea, thought's or general flamings...

Cheers,
Lee Hughes
Director of Traffic


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to