First time here? Check out the FAQ!
THIS IS A TEST INSTANCE. Feel free to ask and answer questions, but take care to avoid triggering too many notifications.
0

capturing named pipes with wireshark

I need to capture named pipes traffic and was wondering if it's possible with wireshark. The forum post below says no, but it's quite old. Just wanted to make sure it's still the case today?

https://superuser.com/questions/31368...

Thanks

net_tech's avatar
120
net_tech
asked 2018-02-11 11:27:51 +0000
edit flag offensive 0 remove flag close merge delete

Comments

wondering if i can use this method ?

https://github.com/Vatyx/NamedPipeCap...

net_tech's avatar net_tech (2018-02-11 11:35:13 +0000) edit

What do you mean by "named pipes traffic"?

Is this on Windows? If not, there's no mechanism that any UN*X I know of provides that would allow Wireshark to capture traffic between two other processes.

If this is on Windows, is this traffic between two processes on the same machine or between two processes on different machines?

Guy Harris's avatar Guy Harris (2018-02-11 21:36:51 +0000) edit

Yes, it's on a Windows pc and it's both, the traffic between 2 windows systems and traffic on the same windows pc.

I found something that may do exactly what i was looking for

http://ioninja.com/plugins/pipe-liste...

net_tech's avatar net_tech (2018-02-12 02:18:55 +0000) edit

Found a much easier way to capture database calls.

Used sqllocaldb info to get the name of the db engine and the rest of the process is described in the article below.

https://www.mssqltips.com/sqlserverti...

net_tech's avatar net_tech (2018-02-25 14:45:01 +0000) edit
add a comment see more comments

2 Answers

1

Wireshark could capture named pipe traffic between two Windows systems by sniffing on the network between the systems (with the usual issues if it's a switched Ethernet or if it's a Wi-Fi network; network named pipe traffic would appear as SMB traffic.

Wireshark can't capture named pipe traffic between two processes on the same machine. It sounds as if IO Ninja might be able to do that. It looks as if the GitHub project also can intercept named pipe traffic between two processes on a given machine (perhaps by overriding Windows API calls to write to the named pipe with calls that write to the named pipe and provide a copy on the other named pipe) and feed that to Wireshark, over another pipe, as fake TCP (or UDP?) packets.

Guy Harris's avatar
19.9k
Guy Harris
answered 2018-02-12 02:29:37 +0000, updated 2018-02-12 02:34:34 +0000
edit flag offensive 0 remove flag delete link

Comments

Thank you!

net_tech's avatar net_tech (2018-02-12 11:58:02 +0000) edit
add a comment see more comments
1

The comments to Answer in your superuser link clarify that Wireshark can receive pcap-formatted data through a named pipe, allowing to use another application to capture packets on some exotic interfaces and feed Wireshark with them.

The github project seems to make use of that Wireshark's API to capture messages sent over a named pipe between two generic processes and feed them as packets in pcap encapsulation to Wireshark via another named pipe. However, this says nothing about the format and contents of the messages themselves. There is little point in sending messages with network packet headers via a named pipe, so most likely even if Wireshark can receive the messages (the screenshot suggests that they come with some cooked Ethernet, IP and TCP headers), their contents would be proprietary so you'd have to write your own dissector to analyse them.

sindy's avatar
6.2k
sindy
answered 2018-02-11 16:16:54 +0000, updated 2018-02-11 16:18:53 +0000
edit flag offensive 0 remove flag delete link

Comments

add a comment see more comments

Your Answer

Please start posting anonymously - your entry will be published after you log in or create a new account. This space is reserved only for answers. If you would like to engage in a discussion, please instead post a comment under the question or an answer that you would like to discuss.

Add Answer