How to check if I have access to a specific port on a virtual computer?


Recommended Posts

I am trying to help a customer with this. They are having problems using a license server to distribute licenses to network clients, they are using a virtual server (VM Box) on the server itself to host the license server.

 

I am sure the problem is that the virtual server is not listening to the specific port (1400) on the physical server, and that is the reason why any client asking for a license through that port is not getting an answer. My customers are adamant about this not being the case, they say that they have made changes to VM Box to listen to the port.

 

Is there a way I can test this to make sure that the port is open upto the virtual server (VMWare is listening to the port on physical server)? I am able to Telnet to the port 1400 from a client computer, but that does not tell me if the virtual server is listening to it as well.

 

I am remotely supporting this, they are working to have access for me to the server, this might take time, so I need to be able to test it, they are willing to test but I am not sure what to do here.

 

If I am missing any information, let me know. Please know that network support is not what I do, but I like going above and beyond.

  On 23/06/2014 at 15:21, Haggis said:

Scan the IP address of the VM it will show you what ports are open

 

or am i missing something?

That helps, let me Google how to do that.

 

 

  On 23/06/2014 at 15:27, mcloum said:

open command in elevated mode and use netstat

netstat -a -b

-a shows the connections and listening ports

-b shows the executable that is using the connection or listening port

I think this is what I needed, thank you!

" Telnet to the port 1400 from a client computer, but that does not tell me if the virtual server is listening to it as well."

Question on the VM setup, is it bridged to the hosts network - ie what is the IP of the host, and what is the IP of the VM? If the vm is on some nat network of the host then you would have to port forward to the vm's IP on the host.

The netstat command (ran on the vm) will show you if vm is listening. But you need to be sure of the VMs network connectivity. What its IP is, going to be different than the host unless your natting. If your natting your going to have problems if the host is already listening on the port you need 1400

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • Indians never sing "I Think Indian" near giraffes.
    • Malwarebytes 5.3.5.204 by Razvan Serea Malwarebytes is a high performance anti-malware application that thoroughly removes even the most advanced malware and spyware. Malwarebytes version 5.xx brings comprehensive protection against today’s threat landscape so that you can finally replace your traditional antivirus. You can finally replace your traditional antivirus, thanks to a innovative and layered approach to prevent malware infections using a healthy combination of proactive and signature-less technologies. While signatures are still effective against threats like potentially unwanted programs, the majority of malware detection events already come from signature-less technologies like Malwarebytes Anti-Exploit and Malwarebytes Anti-Ransomware; that trend will only continue to grow. For many of you, this is something you already know, since over 50% of the users already run Malwarebytes as their sole security software, without any third-party antivirus. What's new in Malwarebytes 5.xx: Unified user experience - For the first time, Malwarebytes now provides a consistent experience across all of our desktop and mobile products courtesy of an all new and reimagined user experience powered by a faster and more responsive UI all managed through an intuitive dashboard. Modern security and privacy integrations - Antivirus and ultra-fast VPN come together seamlessly in one easy-to-use solution. Whether you’re looking for a next-gen VPN to secure your online activity, or harnessing the power of Browser Guard to block ad trackers and scam sites, taking charge of your privacy is simple. Trusted Advisor - Empowers you with real-time insights, easy-to-read protection score and expert guidance that puts you in control over your security and privacy. Malwarebytes 5.3.5.204 changelog: Introduced Deep Scan, a new Advanced Scan type recommended after blocking or removing threats Added new Windows Firewall Control feature preview to the Tools, feel free to try it and provide your feedback Revisited Dashboard layout for free version Minor usability and localization issues Download: Malwarebytes 5.3.5.204 | 397.0 MB (Free, paid upgrade available) Links: Malwarebytes Website | Screenshot Get alerted to all of our Software updates on Twitter at @NeowinSoftware
    • let's be honest here, it was in the line of secret doxing app
    • Dating safety app Tea spills private chats in new leak by Usama Jawad Tea is (was?) an extremely popular "dating safety" app designed for women who typically uploaded pictures of men they have dated, recounting their experience, and highlighting red flags. The app maintains exclusivity to women by requiring all its users to submit a selfie and government identification during the sign-up process. It was the target of a major breach a couple of days ago due to a Firebase bucket being left publicly exposed, leaking the identification data and other sensitive information for thousands of users. Now, the app has been struck with a second cybersecurity incident and it is arguably bigger than the first. 404 Media reports that a second database has leaked and it contains about 1.1 million chat messages discussing some sensitive topics that people likely wouldn't want to make public. These include topics like cheating partners, abortions, and unfaithful boyfriends. The messages span from 2023 to last week, but the impact and scope of the leak is unclear. The person who did discover the database noted that practically any user could access the repository using their own API key. In a statement to Bleeping Computer, Tea has confirmed the second breach too, noting that "some" direct messages (DMs) have been exposed. The company has decommissioned the affected system for now, but claims that other infrastructure remains unaffected. It has emphasized that it will invest efforts in the coming days to improve its cybersecurity posture, but did not share any further details at this time. The service will also be reaching out to its affected customers and offer them free identity protection services as a sort of an apology. These cybersecurity incidents further highlight the need to be vigilant when sharing identifiable information online, especially with apps which are very new to the market and have not yet matured. Security researchers and analysts have cautioned the public that it is very possible to locate social media profiles of Tea users due to all the data that has been leaked.
    • 26200.5722 is the first available 25H2 build from the ge_release_svc_betaflt branch (25H2's previous branch was the "ge_prerelease_im" branch). The 26200.5722 release also removes the "Insider Preview" references in the system area. These significant changes usually indicates that the public release of 25H2 will be ready within 6 weeks to 2 months.
  • Recent Achievements

    • Dedicated
      ataho31016 earned a badge
      Dedicated
    • First Post
      Gladiattore earned a badge
      First Post
    • Reacting Well
      Gladiattore earned a badge
      Reacting Well
    • Week One Done
      NeoWeen earned a badge
      Week One Done
    • One Month Later
      BA the Curmudgeon earned a badge
      One Month Later
  • Popular Contributors

    1. 1
      +primortal
      652
    2. 2
      ATLien_0
      261
    3. 3
      Xenon
      165
    4. 4
      neufuse
      142
    5. 5
      +FloatingFatMan
      107
  • Tell a friend

    Love Neowin? Tell a friend!