Query Details
# Windows Network Sniffing ## Query Information #### MITRE ATT&CK Technique(s) | Technique ID | Title | Link | | --- | --- | --- | | T1040 | Network Sniffing | https://attack.mitre.org/techniques/T1040 | #### Description In Windows the default tool Packet Monitor can be used to capture network traffic. This traffic might contain valueble information that an attacker can use. Valueble information can be found in HTTP traffic, because it goes unencrypted over the wire. #### Risk Actor can use network sniffing to capture information. If data (passwords) is send unencrypted they can also be collected ans used to collect credentials. #### References - https://learn.microsoft.com/en-us/windows-server/networking/technologies/pktmon/pktmon ## Defender For Endpoint ``` DeviceProcessEvents | where FileName == "PktMon.exe" | project Timestamp, DeviceName, ProcessCommandLine ``` ## Sentinel ``` DeviceProcessEvents | where FileName == "PktMon.exe" | project TimeGenerated, DeviceName, ProcessCommandLine ```
The query is searching for events related to the execution of the "PktMon.exe" process. It retrieves the timestamp (or time generated in Sentinel), device name, and process command line for these events. The purpose of this query is to identify instances of network sniffing using the default Windows tool called Packet Monitor.

Bert-Jan Pals
Released: February 14, 2023
Tables
Keywords
Operators