Skip to content

Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.

License

Notifications You must be signed in to change notification settings

H4NM/WhoYouCalling

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

54 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

WhoYouCalling

Monitors network activity made by a process through the use of Windows Event Tracing (ETW) and Full Packet Capture (FPC). Filters a generated .pcap file with BPF based on the detected network activity made by the process. This application makes process network monitoring hella' easy.

"Why not just use ProcMon+Wireshark??"🤔🤔

One of the best methods of monitoring activities by a process in Windows is with the Sysinternal tool ProcMon. However, there are some downsides:

  1. Manual Work: To get a Full Packet Capture per process you need to manually start a packet capture with a tool like Wireshark/Tshark, and create a filter for endpoints based on the results of ProcMon, which can be timeconsuming and potential endpoints may be missed due to human error if the process is not automated.
  2. Child processes: It can be tedious to maintain a track record of all of the child processes that may spawn and the endpoints they're communicating with.
  3. DNS queries: (AFAIK) ProcMon doesn't support capturing DNS queries. It does enable provide with UDP Send to port 53, but no information of the actual domain name that's queried nor the given address response.

Features:

  • Can start and monitor an executable or listen to an already running process
  • Records TCPIP activities made by a processes, netflow style.
  • Records DNS requests and responses made and retrieved by applications
  • Creates a full packet capture .pcap file per process
  • Can apply strict filtering to only record TCPIP activity being sent from the process. This is applied to the recorded .pcap
  • Can be automated with a timer
  • By default all monitoring is applied to all spawned child processes.
  • Results can be exported to JSON
  • Can generate a Wireshark DFL filter per process.
  • Can generate a BPF filter per process.

Usage:

(Must be run as administrator - for packet capture and listening to ETW)

Execute a binary with arguments and track all child processes made by it. Output the results to a folder on the user desktop: WhoYouCalling.exe -e C:\Users\Desktop\TestApplication.exe -a "--pass=ETph0n3H0m3" -f -i 4 -o C:\Users\H4NM\Desktop

Listen to process with PID 1337 and output the results to json. Skip FPC (Which will only log the ETW activity): WhoYouCalling.exe --pid 1337 --nopcap --json --output C:\Users\H4NM\AppData\Local\Temp

Run sus.exe for 60 seconds with FPC on the 8th enumerated interface. When the timer expires, kill all tracked pprocesses - including child processes: WhoYouCalling.exe -e C:\Users\H4NM\Desktop\sus.exe -t 60 -k -i 8 -o C:\Users\H4NM\Desktop

Example results

ConsoleResults FolderResults

Complementary Tools

There are other tools that can compliment your quest of application network analysis:

  • Frida: Provides the most granular interaction with applications in which you can view API calls made.
    • "It lets you inject snippets of JavaScript or your own library into native apps on Windows, macOS, GNU/Linux, iOS, watchOS, tvOS, Android, FreeBSD, and QNX."
  • Deluder and PETEP (PEnetration TEsting Proxy): Deluder uses frida but acts as an interface towards capturing the network traffic made by the application, similar to WhoYoucalling. Deluder also allows for many other fun things, including integration with the PETEP proxy for viewing and editing packets live.

Did i miss any other suitable tool? Let me know.

To Do:

  • LOKAL TODO: DNS BUGG vid mottagande response (AAAA) "QueryName="www.songsofconquest.com" QueryType="28" QueryOptions="722 968 478 755 217 408" QueryStatus="0" QueryResults="type: 5 ext-sq.squarespace.com;::ffff:198.185.159.144;::ffff:198.185.159.145;::ffff:198.49.23.144;::ffff:198.49.23.145;"/>" Innehåller flera adresser som inte parsas ut ordentligt. Lösning vore om en lista med alla uthämtade returneras och alla dem bearbetas för sig

  • Add flag to capture every process with the same executable name rather than following a chain of PIDs.

    • Noticed in the execution of firefox where it called a seperate process (explorer.exe) to start firefox. This is missed by --fulltracking.
      • LOKAL NOTE: Har lagt in två variabler som ska populeras vid angivet argument nu för filnamn att övervaka.

Releases

No releases published

Languages