Network and process forensics toolset
One of our readers recently asked us if we were aware of any integrated tools that would let an analyst compare network events against process events on a specific computer. As he pointed out, there are many tools that can tell you what is going on network-wise (netstat, tcpdump, portmon, etc.) and plenty that can tell you what the computer is doing (procmon, process explorer, etc.) but none that bring them all together. Here is how he described his wish list:
I want a tool (or set of tools) for monitoring a Windows PC in such a way that:
* it monitors packets in pcap, like tcpdump and
* it monitors each process network activity like netstat -anpb while
* being able to keep log and records of process activity changes, not just showing the past few seconds' changes.
A sample usecase scenario: I wake up in the morning and check my Wireshark or NetWitness Investigator logs and notice a strange session and I want to be able to quickly glue that session to a process that has been responsible for that...
While a mix of netstat and command-line Foo for piping outputs to a log file among Wireshark can do the job, I hope there must be a decent and handy tool out there, for this purpose.
So, readers - got any ideas? We had a lively debate between some of the handlers earlier today but could not come up with exactly what he is looking for. If you know of such a tool please use the comment feature below to tell us all about it. Of course, we are aware of Microsoft's Sysinternals suite by Mark Russinovich but that is not what our reader is looking for.
Thanks for any ideas.
Marcus H. Sachs
Director, SANS Internet Storm Center
Comments
Mick
Apr 11th 2010
1 decade ago
http://the.wiretapped.net/security/network-monitoring/tcpspy/
Brad
Apr 12th 2010
1 decade ago
Steve
Apr 12th 2010
1 decade ago
Make a UNC connection to the machine.
Silently install MS NetMon with psexec:
psexec \\COMPUTERNAME -c NM33_x86.exe /q
Check the time on the computer to aid in scheduling the capture task:
net time \\COMPUTERNAME
Copy a "capture.bat file to the NetMon dir on the machine:
xcopy capture.bat "\\COMPUTERNAME\C$\program files\Microsoft Network Monitor 3\"
Contents of "capture.bat"
c:
cd "c:\program files\Microsoft Network Monitor 3"
nmcap /network * /capture tcp /File C:\temp\tcp.cap /terminatewhen /timeafter 60 seconds
Remotely schedule the task:
schtasks /create /s COMPUTERNAME /tn "NetCapTest" /tr "c:\program files\Microsoft Network Monitor 3\capture.bat" /sc once /st 10:25:00 /sd 04/12/2010
Copy the tcp.cap file over and review the contents.
Regards.
Jeff
Apr 12th 2010
1 decade ago
"Process Reporter" and its counterpart "Process Reporter Parser". Very cool service and LOTS of data on the processes running. Transparent to the user from what I have found. It has aided us in identifying malware that only 2 of 39 vendors on VirusTotal were able to detect.
Rick
Apr 12th 2010
1 decade ago