Why is Port (5037) Active on Loopback?
I start up the Loopback Adapter on Wireshark, then I will start another Wireshark capture for my ethernet interface. When I do this, the Loopback Adapter will have at least 2 frames, with port (5037). This is an Android device and I'm on Windows 10. In Resource Monitor on my Windows 10, I have an extra Network name that gets most of the traffic. Is there anyway to find out if these are connected?
Thank you so very much,
Vtechie
In the preview this looks like it is all jumbled together, but in my view of it as I have copied and pasted, it is not that way. Sorry, I cannot straighten it out.
60 Points needed to upload a picture. I do not have that yet.
Frame 1: 56 bytes on wire, 56 bytes captured on interface \Device\NPF_Loopback, id 0
Null/Loopback
Family: IP (2)
Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1)
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 52
Identification: 0xc45a (50266)
Flags: 0x40, Don't fragment
0... .... = Security flag: Not evil
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 128
Protocol: TCP (6)
Header Checksum: 0x0000 incorrect, should be 0x3867(may be caused by "IP checksum offload"?)
[Expert Info (Error/Checksum): Bad checksum [should be 0x3867]]
[Header checksum status: Bad]
[Calculated Checksum: 0x3867]
Source Address: 127.0.0.1 (127.0.0.1)
<Source or Destination Address: 127.0.0.1 (127.0.0.1)>
<[Source Host: 127.0.0.1]>
<[Source or Destination Host: 127.0.0.1]>
Destination Address: 127.0.0.1 (127.0.0.1)
<Source or Destination Address: 127.0.0.1 (127.0.0.1)>
<[Destination Host: 127.0.0.1]>
<[Source or Destination Host: 127.0.0.1]>
Transmission Control Protocol, Src Port: 49688 (49688), Dst Port: 5037 (5037), Seq: 0, Len: 0
Source Port: 49688 (49688)
Destination Port: 5037 (5037)
<Source or Destination Port: 49688 (49688)>
<Source or Destination Port: 5037 (5037)>
[Stream index: 0]
[Conversation completeness: Incomplete (37)]
[TCP Segment Len: 0]
Sequence Number: 0 (relative sequence number)
Sequence Number (raw): 2276443805
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 0
Acknowledgment number (raw): 0
1000 .... = Header Length: 32 bytes (8)
Flags: 0x002 (SYN)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...0 .... = Acknowledgment: Not set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..1. = Syn: Set
[Expert Info (Chat/Sequence): Connection establish request (SYN): server port 5037]
[Connection establish request (SYN): server port 5037]
<Message: Connection establish request (SYN): server port 5037>
[Severity ...
So you are off line and communicating with an hacker that you identified as using Android? In my book that sound rather unlikely.
The sinlge SYN packet shown has nothing that validates your suggestion.
Also note from your output:
Still just a standard tcp connection attempt with a SYN in frame 1 and a RST in frame 2, probably because there's nothing listening on the destination port (5037) which is assigned by IANA to be the Android ADB Server port.