501 lines
17 KiB
Markdown
501 lines
17 KiB
Markdown
|
||
[live.sysinternals.com - /](https://live.sysinternals.com/)
|
||
|
||
[GitHub - Sysinternals/sysinternals: Content for sysinternals.com](https://github.com/Sysinternals/sysinternals)
|
||
|
||
|
||
Process Monitor: [Procmon64.exe](file:///D:%5CInstalad%5CSysInternals%20Suite%20Microsoft%5CProcmon64.exe)
|
||
- Figuring out where on disk/registry GUI based settings are saved
|
||
* Something fails to run/install that really should work with vague message
|
||
Process Explorer: [procexp64.exe](file:///D:%5CInstalad%5CSysInternals%20Suite%20Microsoft%5Cprocexp64.exe)
|
||
- Malware hunting or strange processes exploration
|
||
AutoRuns:[Autoruns64.exe](file:///D:%5CInstalad%5CSysInternals%20Suite%20Microsoft%5CAutoruns64.exe)
|
||
- Malware hunting
|
||
ProcDump: [procdump64.exe](file:///D:%5CInstalad%5CSysInternals%20Suite%20Microsoft%5Cprocdump64.exe)
|
||
- When all else fails, do a memory dump and load it in windbg.
|
||
ZoomIt:[ZoomIt64.exe](file:///D:%5CInstalad%5CSysInternals%20Suite%20Microsoft%5CZoomIt64.exe)
|
||
- For zooming on on my screen when explaining stuff (not just presentations)
|
||
AccessEnum:[AccessEnum.exe](file:///D:%5CInstalad%5CSysInternals%20Suite%20Microsoft%5CAccessEnum.exe)
|
||
- Viewing, troubleshooting or reporting on shared folder permissions.
|
||
PSPing:
|
||
- Could test open TCP ports, replaced by Test-NetConnection
|
||
Handle:
|
||
- For showing the process that has a lock or handle on a file
|
||
|
||
|
||
AccessChk - AccessChk is a command-line tool for viewing the effective permissions on files, registry keys, services, processes, kernel objects, and more.
|
||
|
||
AccessEnum - This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions.
|
||
|
||
AdExplorer - Active Directory Explorer is an advanced Active Directory (AD) viewer and editor.
|
||
|
||
AdInsight - An LDAP (Light-weight Directory Access Protocol) real-time monitoring tool aimed at troubleshooting Active Directory client applications.
|
||
|
||
AdRestore - Undelete Server 2003 Active Directory objects.
|
||
|
||
Autologon - Bypass password screen during logon.
|
||
|
||
Autoruns - See what programs are configured to startup automatically when your system boots and you login. Autoruns also shows you the full list of Registry and file locations where applications can configure auto-start settings.
|
||
|
||
BgInfo - This fully-configurable program automatically generates desktop backgrounds that include important information about the system including IP addresses, computer name, network adapters, and more.
|
||
|
||
CacheSet - CacheSet is a program that allows you to control the Cache Manager's working set size using functions provided by NT. It's compatible with all versions of NT.
|
||
|
||
ClockRes - View the resolution of the system clock, which is also the maximum timer resolution.
|
||
|
||
Contig - Wish you could quickly defragment your frequently used files? Use Contig to optimize individual files, or to create new files that are contiguous.
|
||
|
||
Coreinfo - Coreinfo is a new command-line utility that shows you the mapping between logical processors and the physical processor, NUMA node, and socket on which they reside, as well as the cache’s assigned to each logical processor.
|
||
|
||
Ctrl2cap - This is a kernel-mode driver that demonstrates keyboard input filtering just above the keyboard class driver in order to turn caps-locks into control keys. Filtering at this level allows conversion and hiding of keys before NT even "sees" them. Ctrl2cap also shows how to use NtDisplayString() to print messages to the initialization blue-screen.
|
||
|
||
DebugView - Another first from Sysinternals: This program intercepts calls made to DbgPrint by device drivers and OutputDebugString made by Win32 programs. It allows for viewing and recording of debug session output on your local machine or across the Internet without an active debugger.
|
||
|
||
Desktops - This new utility enables you to create up to four virtual desktops and to use a tray interface or hotkeys to preview what’s on each desktop and easily switch between them.
|
||
|
||
Disk2vhd - Disk2vhd simplifies the migration of physical systems into virtual machines (p2v).
|
||
|
||
DiskExt - Display volume disk-mappings.
|
||
|
||
Diskmon - This utility captures all hard disk activity or acts like a software disk activity light in your system tray.
|
||
|
||
DiskView - Graphical disk sector utility.
|
||
|
||
Disk Usage (DU) - View disk usage by directory.
|
||
|
||
EFSDump - View information for encrypted files.
|
||
|
||
Handle - This handy command-line utility will show you what files are open by which processes, and much more.
|
||
|
||
Hex2dec - Convert hex numbers to decimal and vice versa.
|
||
|
||
Junction - Create Win2K NTFS symbolic links.
|
||
|
||
LDMDump - Dump the contents of the Logical Disk Manager's on-disk database, which describes the partitioning of Windows 2000 Dynamic disks.
|
||
|
||
ListDLLs - List all the DLLs that are currently loaded, including where they are loaded and their version numbers. Version 2.0 prints the full path names of loaded modules.
|
||
|
||
LiveKd - Use Microsoft kernel debuggers to examine a live system.
|
||
|
||
LoadOrder - See the order in which devices are loaded on your WinNT/2K system.
|
||
|
||
LogonSessions - List the active logon sessions on a system.
|
||
|
||
MoveFile - Allows you to schedule move and delete commands for the next reboot.
|
||
|
||
NTFSInfo - Use NTFSInfo to see detailed information about NTFS volumes, including the size and location of the Master File Table (MFT) and MFT-zone, as well as the sizes of the NTFS meta-data files.
|
||
|
||
PageDefrag - Defragment your paging files and Registry hives.
|
||
|
||
PendMoves - Enumerate the list of file rename and delete commands that will be executed the next boot.
|
||
|
||
PipeList - Displays the named pipes on your system, including the number of maximum instances and active instances for each pipe.
|
||
|
||
PortMon- Monitor serial and parallel port activity with this advanced monitoring tool. It knows about all standard serial and parallel IOCTLs and even shows you a portion of the data being sent and received. Version 3.x has powerful new UI enhancements and advanced filtering capabilities.
|
||
|
||
ProcDump - This new command-line utility is aimed at capturing process dumps of otherwise difficult to isolate and reproduce CPU spikes. It also serves as a general process dump creation utility and can also monitor and generate process dumps when a process has a hung window or unhandled exception.
|
||
|
||
Process Explorer - Find out what files, registry keys and other objects processes have open, which DLLs they have loaded, and more. This uniquely powerful utility will even show you who owns each process.
|
||
|
||
Process Monitor - Monitor file system, Registry, process, thread and DLL activity in real-time.
|
||
|
||
ProcFeatures - This applet reports processor and Windows support for Physical Address Extensions and No Execute buffer overflow protection.
|
||
|
||
PsExec - Execute processes on remote systems.
|
||
|
||
PsFile - See what files are opened remotely.
|
||
|
||
PsGetSid - Displays the SID of a computer or a user.
|
||
|
||
PsInfo - Obtain information about a system.
|
||
|
||
PsKill - Terminate local or remote processes.
|
||
|
||
PsList - Show information about processes and threads.
|
||
|
||
PsLoggedOn - Show users logged on to a system.
|
||
|
||
PsLogList - Dump event log records.
|
||
|
||
PsPasswd - Changes account passwords.
|
||
|
||
PsService - View and control services.
|
||
|
||
PsShutdown - Shuts down and optionally reboots a computer.
|
||
|
||
PsSuspend - Suspend and resume processes.
|
||
|
||
RAMMap - An advanced physical memory usage analysis utility that presents usage information in different ways on its several different tabs.
|
||
|
||
RegDelNull - Scan for and delete Registry keys that contain embedded null-characters that are otherwise undeleteable by standard Registry-editing tools.
|
||
|
||
RegJump - Jump to the registry path you specify in Regedit.
|
||
|
||
RootkitRevealer - Scan your system for rootkit-based malware.
|
||
|
||
SDelete - Securely overwrite your sensitive files and cleanse your free space of previously deleted files using this DoD-compliant secure delete program.
|
||
|
||
ShareEnum - Scan file shares on your network and view their security settings to close security holes.
|
||
|
||
ShellRunas - Launch programs as a different user via a convenient shell context-menu entry.
|
||
|
||
Sigcheck - Dump file version information and verify that images on your system are digitally signed.
|
||
|
||
Streams - Reveal NTFS alternate streams.
|
||
|
||
Strings - Search for ANSI and UNICODE strings in binaryimages.
|
||
|
||
Sync - Flush cached data to disk.
|
||
|
||
TCPView - Active socket command-line viewer.
|
||
|
||
VMMap - VMMap is a process virtual and physical memory analysis utility.
|
||
|
||
VolumeId - Set Volume ID of FAT or NTFS drives.
|
||
|
||
Whois - See who owns an Internet address.
|
||
|
||
WinObj - The ultimate Object Manager namespace viewer is here.
|
||
|
||
ZoomIt - Presentation utility for zooming and drawing on the screen.
|
||
|
||
|
||
|
||
# Sysinternals Tools Reference Guide
|
||
|
||
Microsoft Sysinternals provides a suite of advanced system utilities and technical information. This reference guide covers key tools, their primary functions, and common use cases.
|
||
|
||
## Process Analysis Tools
|
||
|
||
### Process Monitor
|
||
|
||
**Purpose**: Real-time file system, Registry, and process/thread activity monitoring.
|
||
|
||
**Key Features**:
|
||
|
||
- Captures detailed events in real-time
|
||
- Advanced filtering system
|
||
- Boot time logging
|
||
- Process tree visualization
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Troubleshooting application installation failures
|
||
- Finding where configuration settings are stored on disk/registry
|
||
- Identifying file access failures
|
||
- Detecting unauthorized system modifications
|
||
- Debugging application performance issues
|
||
|
||
**Basic Usage**:
|
||
|
||
- Use filters (Ctrl+L) to reduce noise
|
||
- Set inclusion filters before capturing
|
||
- Use the process tree view to understand relationships
|
||
- Save logs for offline analysis
|
||
|
||
### Process Explorer
|
||
|
||
**Purpose**: Enhanced task manager replacement that shows detailed information about running processes.
|
||
|
||
**Key Features**:
|
||
|
||
- Process hierarchy tree view
|
||
- Detailed properties for each process
|
||
- DLL and handle usage tracking
|
||
- GPU, disk and network activity monitoring
|
||
- Verification against VirusTotal
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Malware hunting and identification
|
||
- Strange process exploration and investigation
|
||
- Finding memory/handle leaks
|
||
- Troubleshooting high resource usage
|
||
- Determining process dependencies
|
||
|
||
**Basic Usage**:
|
||
|
||
- Hover over processes for tooltip information
|
||
- Right-click for detailed properties
|
||
- Use Find (Ctrl+F) to locate specific handles or DLLs
|
||
- Set different highlighting colors for easier visual identification
|
||
|
||
### ProcDump
|
||
|
||
**Purpose**: Command-line utility for creating process memory dumps based on various criteria.
|
||
|
||
**Key Features**:
|
||
|
||
- CPU threshold-based dumps
|
||
- Exception-based triggering
|
||
- Memory commit threshold triggers
|
||
- Scheduled dumping options
|
||
- Multiple dump modes (mini, full, etc.)
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Capturing crash dumps for debugging
|
||
- Creating memory dumps for analysis in WinDbg
|
||
- Performance troubleshooting
|
||
- Analyzing memory leaks
|
||
- Debugging hanging applications
|
||
|
||
**Basic Usage**:
|
||
|
||
```
|
||
procdump -ma <process_name_or_PID> <output_filename>
|
||
procdump -c 80 -s 5 <process_name_or_PID> # CPU spike trigger
|
||
```
|
||
|
||
## System Configuration Tools
|
||
|
||
### AutoRuns
|
||
|
||
**Purpose**: Shows what programs are configured to run during system bootup or login.
|
||
|
||
**Key Features**:
|
||
|
||
- Comprehensive startup locations coverage
|
||
- Integration with VirusTotal
|
||
- Hide signed Microsoft entries option
|
||
- Compare with previous scan results
|
||
- Command-line version available (autorunsc)
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Malware hunting and persistence detection
|
||
- System performance optimization
|
||
- Troubleshooting slow startup
|
||
- Security auditing
|
||
- Removing unwanted startup programs
|
||
|
||
**Basic Usage**:
|
||
|
||
- Use "Verify Code Signatures" option to identify unsigned code
|
||
- Enable VirusTotal submission for suspicious files
|
||
- Filter by entry type using the tabs (Everything, Logon, etc.)
|
||
- Use "Compare" feature to detect recent changes
|
||
|
||
### AccessEnum
|
||
|
||
**Purpose**: Security utility that shows who has access to directories, files, and Registry keys.
|
||
|
||
**Key Features**:
|
||
|
||
- Maps effective permissions for users/groups
|
||
- Scans file systems and Registry
|
||
- Shows permissions inheritance
|
||
- Identifies potential security issues
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Viewing and reporting shared folder permissions
|
||
- Security auditing
|
||
- Troubleshooting access denied errors
|
||
- Identifying over-permissive settings
|
||
- Documenting permission structures
|
||
|
||
**Basic Usage**:
|
||
|
||
- Select the starting directory or Registry key
|
||
- Click "Scan" to analyze permissions
|
||
- Sort results by permission type
|
||
- Export to CSV for reporting
|
||
|
||
## Networking Tools
|
||
|
||
### PSPing
|
||
|
||
**Purpose**: Ping-like utility that measures network performance.
|
||
|
||
**Key Features**:
|
||
|
||
- TCP/IP latency measurement
|
||
- TCP port testing
|
||
- ICMP echo testing
|
||
- Bandwidth measurement
|
||
- Detailed statistics
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Testing connectivity to specific TCP ports
|
||
- Measuring network latency
|
||
- Performance benchmarking
|
||
- Diagnosing network issues
|
||
- Alternative to PowerShell's Test-NetConnection
|
||
|
||
**Basic Usage**:
|
||
|
||
```
|
||
psping -n 100 www.example.com # ICMP ping
|
||
psping -4 -tcp 192.168.1.1:80 # TCP ping
|
||
psping -b -l 8k 192.168.1.1:445 # Bandwidth test
|
||
```
|
||
|
||
### PSExec
|
||
|
||
**Purpose**: Execute processes remotely on Windows systems.
|
||
|
||
**Key Features**:
|
||
|
||
- Run commands on remote systems
|
||
- Interactive or background mode
|
||
- Run as different user
|
||
- Copy programs to remote systems for execution
|
||
- Can run GUI applications remotely
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Remote administration
|
||
- Running commands on multiple computers
|
||
- Executing programs with different credentials
|
||
- Running programs interactively on remote systems
|
||
- Automating tasks across networks
|
||
|
||
**Basic Usage**:
|
||
|
||
```
|
||
psexec \\remote_computer -u domain\user -p password cmd.exe
|
||
psexec \\remote_computer -s regedit.exe # Run as SYSTEM
|
||
```
|
||
|
||
**Note**: Many PSExec functions are now available through PowerShell's Invoke-Command.
|
||
|
||
## Debugging & Diagnostic Tools
|
||
|
||
### Handle
|
||
|
||
**Purpose**: Displays handles opened by processes and the specific files/objects they have open.
|
||
|
||
**Key Features**:
|
||
|
||
- Shows open handles for all processes
|
||
- Filters by process, handle type, or object name
|
||
- Can close handles (with -c option)
|
||
- Command-line operation
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Finding which process has a file locked
|
||
- Troubleshooting "file in use" issues
|
||
- Identifying resource leaks
|
||
- Debugging application issues
|
||
- Investigating file access problems
|
||
|
||
**Basic Usage**:
|
||
|
||
```
|
||
handle # List all handles
|
||
handle -p explorer # Handles opened by explorer.exe
|
||
handle "C:\temp" # Find processes with handles to this path
|
||
```
|
||
|
||
### ZoomIt
|
||
|
||
**Purpose**: Screen zoom and annotation tool for technical presentations.
|
||
|
||
**Key Features**:
|
||
|
||
- Zoom in on any part of the screen
|
||
- Drawing tools for live annotations
|
||
- Break timer function
|
||
- Configurable keyboard shortcuts
|
||
- Presentation mode
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Highlighting details during presentations
|
||
- Explaining technical concepts visually
|
||
- Drawing attention to specific screen elements
|
||
- Annotating screenshots in real-time
|
||
- Making small text readable for audiences
|
||
|
||
**Basic Usage**:
|
||
|
||
- Default zoom shortcut: Ctrl+1
|
||
- Drawing mode: Ctrl+2
|
||
- Type mode: Ctrl+3
|
||
- Press ESC to exit any mode
|
||
|
||
## Additional Useful Tools
|
||
|
||
### Disk2vhd
|
||
|
||
**Purpose**: Creates VHD (Virtual Hard Disk) versions of physical disks.
|
||
|
||
**Key Features**:
|
||
|
||
- Creates VHD/VHDX while system is running
|
||
- Volume Shadow Copy (VSS) snapshot technology
|
||
- Can include/exclude specific volumes
|
||
- Compatible with Hyper-V
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Physical-to-virtual (P2V) migrations
|
||
- System backup
|
||
- Test environment creation
|
||
- Troubleshooting in a virtual environment
|
||
|
||
### TCPView
|
||
|
||
**Purpose**: Detailed listing of all TCP and UDP connections.
|
||
|
||
**Key Features**:
|
||
|
||
- Real-time connection monitoring
|
||
- Process-to-connection mapping
|
||
- Endpoint resolution (DNS lookups)
|
||
- Connection state tracking
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Identifying unexpected network connections
|
||
- Monitoring application network activity
|
||
- Troubleshooting network issues
|
||
- Security monitoring
|
||
|
||
### BGInfo
|
||
|
||
**Purpose**: Displays system information on the desktop background.
|
||
|
||
**Key Features**:
|
||
|
||
- Customizable information display
|
||
- Script/command output integration
|
||
- Multiple configuration support
|
||
- Remote deployment options
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Server identification in data centers
|
||
- Displaying critical system information
|
||
- Quick access to system specs
|
||
- Support environment identification
|
||
|
||
### Sysmon
|
||
|
||
**Purpose**: System monitoring service that records system activity to Windows Event Log.
|
||
|
||
**Key Features**:
|
||
|
||
- Process creation monitoring
|
||
- Network connection logging
|
||
- Driver/image loading detection
|
||
- WMI event monitoring
|
||
- Advanced filtering via XML configuration
|
||
|
||
**Common Use Cases**:
|
||
|
||
- Security monitoring and threat hunting
|
||
- Intrusion detection
|
||
- Forensic investigation
|
||
- Compliance monitoring
|
||
- Malware behavior analysis
|
||
|
||
## Resources
|
||
|
||
- Official Sysinternals Website: https://docs.microsoft.com/en-us/sysinternals/
|
||
- Sysinternals Live: \live.sysinternals.com\tools\
|
||
- Windows Internals Books (by Mark Russinovich)
|
||
- Sysinternals Forums: https://techcommunity.microsoft.com/t5/sysinternals/bd-p/Sysinternals |