albtechportal

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 9 July 2013

Using Microsoft Network Monitor

Posted on 06:23 by Unknown
In this post I'll describe how to use Microsoft Network Monitor to analyze the connections that your computer creates out on the Internet, and find out what goes on between the programs you run and the servers they send information to. First, what is Network Monitor? It used to be that Microsoft only made basic monitoring tools, but since version 3.0, the Network Monitor tool has become a powerful packet capture and analysis program.

Now, why would someone want to use it as opposed to something like Wireshark? The two are very similar but do have a few differences. For one, the big advantage of Network Monitor is that it separate conversations based on the program, and on the server it connects to. For example, you will see an entry for your browser, your mail client, and so on, and inside of each, you'll have a different conversation for each web site you currently have open. Also, in my opinion the filters provided are easier to work with than Wireshark. On the negative side, it doesn't provide color-coded entries, but you can add your own.



Getting started


First you'll have to download the latest version of Network Monitor from the Microsoft site here. This will install the packet capture driver and the monitoring software. Simply double click on the icon to launch it.

In the program window, you can see a list of your interfaces on the lower left corner. Usually you'll want to select your Local Area Connection or whichever link you use to connect to the Internet. Then, click on the New Capture toolbar button. This will open a new tab for your capture, and you can click the Start toolbar button.

As the capture is going on, you will be able to see on the left pane the various applications that use the network, and the conversations they are having. You will see application names such as Firefox or Internet Explorer, and less obvious ones like System, svhost and Unknown. Once you've captured for a while you can Stop the capture and start analyzing the results.

Packet analysis


If you aren't familiar with networking protocols this may look intimidating. First, click on a conversation on the left pane, such as a web site you went to. Next to each conversation, you will see your own IP address and the IP of the machine you connected to. On the right side of the screen you will see the list of packets that were sent. You may also see the host names of the servers you connected to, which is more useful than just IP addresses.

As you click on any of the lines on the right pane, you will see the details appear in the two windows at the bottom right of the screen. The right one is the raw packet in HEX code, but the left one gives you information about all the protocols used, such as the version number, which ports were used, and so on.

You can also filter the results by using the top right box. Simply click on the Load Filter button, and you can see a series of default filters that Microsoft has by default. You could restrict to just web traffic, or network shares, DNS, and so on.

Real world example


Here's a quick example of what can be found this way. In the screenshot above I showed about 2 minutes of network traffic, during which I went to a few web sites, one of which was Microsoft.com. In the list, there was a conversation with an unknown IP, under the System process, which I clicked on, as shown below.



As you can see in this screenshot, this IP turned out to be microsoft.webtrends.akadns.net, which I assume is some kind of ads or monitoring service. But if you look at the packet information, at the very bottom of the screen, we can see exactly the URL called. It seems that by going to a Microsoft site, it also invoked a script on this site, to which it passed not only the address I went to on the Microsoft site, but also the Google search string I used to find the site, as a referral.

This is the kind of nifty information that can be shown, network connections you may not even imagine your computer is doing, and Network Monitor can be a great tool to track them down. While this example is probably quite benign, you can use the same steps to track down spyware and so on.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Tutorials, Win7 | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Review: Seagate 600 480GB SSD
    Seagate Joins the Fray It’s been quite an interesting turn of events over the past couple years in the storage industry. Whereas practical...
  • Top 10 Ways to Customize Your Desktop
    1 Expand You spend a lot of waking hours at your computer, so why not make it a little prettier (and more productive)? Here are 10 ways to...
  • CCBoot - LAN Boot Software for Windows
    LAN Boot Solution Background LAN boot is a technology based on IP (Internet Protocol), UDP (User Datagram Protocol), DHCP (Dynamic ...
  • ‘Strata’ for iOS and Android game review
    There are games that are fun. There are games that look great. And then there are games that do both. Strata is one such game that h...
  • Adobe Photoshop CS6 Extended 13.0 & Plugins + Textures
    Adobe Photoshop CS6 Extended 13.0 & Plugins + Textures | 3.5 GB Adobe Photoshop CS6 Extended software delivers even more imaging magi...
  • Intel NUC DC53427RKE / HYE Review
    Manufacturer: Intel UK Price (as reviewed): £308.32 (inc VAT) US Price (as reviewed): $539.99 (ex TAX) Preferred Partner Price: £308.32...
  • ASUS R9 270X DirectCU II TOP 2 GB
    AMD's new Radeon R9 270X draws its lineage more from the Radeon HD 7800 series than any other. The R9 270X is, for all intents and purp...
  • Corsair Raptor M40 Review
    Manufacturer: Corsair UK price (as reviewed): £44.99 (inc VAT) US price (as reviewed): $59.99 (ex Tax) Along with the Raptor M30, Corsai...
  • Call of Duty: Ghosts Review
    Developer: Infinity Ward Publisher: Activision Platforms: PC, X360, PS3, PS4, Xbox One Price: £39.99 Reviewing a Call of Duty game is a ...
  • How to remotely install apps on your smartphone
    You can download and install apps to your iPhone and Android phone without being anywhere near it. That sorcery is this? It isn't sorce...

Categories

  • Android
  • Apple
  • Audio
  • Blogger
  • C/C++
  • Cabling
  • Cameras
  • Cases
  • CISCO
  • Cooling
  • CPU
  • Desktop
  • DNS
  • Ebook
  • Fiber Optic
  • Gadgets
  • Game
  • Google
  • Graphic Card
  • Hardware
  • HDD
  • HTC
  • HTMLCSS
  • Hyper-V
  • Intel
  • iOS
  • iPad
  • Iphone
  • IT
  • jQuery
  • Laptop
  • Linux
  • Mac
  • MacTut
  • Microsoft
  • Mobile
  • Mouse
  • Networking
  • News
  • Nexus
  • Nokia
  • Nvidia
  • OS
  • PERIPHERALS & COMPONENTS
  • Photoshop
  • Printers
  • Programming
  • Projectors
  • PS4
  • Ram
  • RedHat
  • Review
  • Samsung
  • Scanners
  • Seagate
  • Security
  • Server2008
  • Server2012
  • Servers
  • Smartphone
  • Software
  • Sony
  • Storage
  • Tablets
  • TechNews
  • Template
  • Tutorials
  • TV
  • Ubuntu
  • Voip
  • Webdesign
  • Webiste
  • WebServer
  • Win7
  • Win8
  • Windows Phone
  • Wordpress
  • Workstation
  • XBOX

Blog Archive

  • ▼  2013 (495)
    • ►  December (35)
    • ►  November (332)
    • ►  October (12)
    • ►  September (27)
    • ►  August (2)
    • ▼  July (10)
      • iPad 5 rumor rollup for the week ending July 11
      • 20 iPhone tips for iPhone 4s
      • How to Wipe Your iPhone Without Losing Your Jailbr...
      • Using Microsoft Network Monitor
      • Upgrading and Repairing PCs (20th Edition)
      • Oracle Database 11g DBA 1 1Z0-052 series- CBTNuggets
      • CompTIA Linux Course Plus Training LX0-101 DVD1
      • Linux Professional Institute (LPIC) course with Ar...
      • Cisco ASA5500 (5505, 5510, 5520, etc) Series Firew...
      • Best Free Blogger Template Resources for Download
    • ►  June (42)
    • ►  May (35)
Powered by Blogger.

About Me

Unknown
View my complete profile