Lou,
The netscan command [1] uses pool tag scanning like connscan [2]. Thus it
has the same pros/cons described - in particular "This can find artifacts
from previous connections that have since been terminated, in addition to
the active ones. In the output below, you'll notice some fields have been
partially overwritten, but some of the information is still accurate."
In other words, you may have found remnants of a connection that was once
established, but was closed before the memory dump was taken. The structure
is still lingering, but some pointers within the structure (namely those
that identify the owning process) are no longer valid.
HTH,
Michael
[1].
https://code.google.com/p/volatility/wiki/CommandReference23#netscan
[2].
https://code.google.com/p/volatility/wiki/CommandReference23#connscan
On Thu, May 16, 2013 at 12:57 PM, Lou LaRocca <louislarocca(a)gmail.com>wrote:
Greetings
I am looking at Win 7 x86 SP1 memory and I dont understand why I am seeing
"established connections" but no PID or Process with it.
0x2d07480 TCPv4 10.22.41.40:58767 38.126.225.229:43405ESTABLISHED
-------- --------------
0x1367da70 TCPv4 10.22.41.40:59302 151.213.50.211:22031ESTABLISHED
-------- --------------
In addition I am seeing stuff "listening" and it contains the PID and
Process.
0xdb838178 TCPv4 0.0.0.0:49154 0.0.0.0:0
LISTENING 996 svchost.exe
0xdb850ab0 TCPv4 0.0.0.0:49155 0.0.0.0:0
LISTENING 1440 spoolsv.exe
0xdb855e78 TCPv4 0.0.0.0:49155 0.0.0.0:0
LISTENING 1440 spoolsv.exe
So my question is why can I see the listening processes but im not getting
the Process that are established?
Thanks for the help
Lou
_______________________________________________
Vol-users mailing list
Vol-users(a)volatilityfoundation.org
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users