The SANS ISC blog had s great tip last week if you ever needed to perform a packet capture but didn’t have ready access to the usual set of tools like Wireshark or tcpdump. On the defensive side you might need something like this to debug a problem. Offensively, this method offers a nice way to perform a local packet capture once you gain a foothold within a target network.
Enter the Windows “netsh trace” command. The article goes into much more detail but here’s the general gist.
netsh trace help : Show the different command options
netsh trace start capture=yes : Start a capture
netsh trace stop : Stop a capture
And beyond adding some capture filters if you wish, that’s about it. By default the capture format is in Microsoft’s ETL format, which you can open in their Microsoft Analyzer tool. Analyzer also offers export options in more traditional formats such as PCAP. The best tip in the article though is this little PowerShell script to do the same thing.
$s = New-PefTraceSession -Path “C:\output\path\spec\OutFile.Cap” -SaveOnStop
$s | Add-PefMessageProvider -Provider “C:\input\path\spec\Input.etl”
$s | Start-PefTraceSession
Check out the full article here.
#####
Today’s post pic is from CyberNetNews.com.
Windows’ Built-In Wireshark http://t.co/JmnnhV7Q01
BLOGGED: Windows’ Built-In Wireshark http://t.co/uT7ImUJma3