AdiKo / RPCSniffer

RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.
64 stars 14 forks source link

RPCSniffer

RPCSniffer sniffs RPC messages in a given RPC server process.

sniffing example in spoolsv process

General Information

With RPCSniffer you can explore RPC Messages that present on Microsoft system. The data given for each RPC message contains the following details:

Install steps

  1. Install python 2.7 (64 bit)

  2. Install the latest Winappdbg python package

  3. Install Wireshark

  4. Intsall the latest Pyreshark python module for wireshark

  5. grab the file _"pyreshark_rpc_dissector/rpcprotocol.py" to "c:\Program Files\Wireshark\python\protocols\"

Run

  1. Start Wireshark from cmd and prepare it to use rpcsniffer's pipe
    "C:\Program Files\Wireshark\Wireshark.exe" -i \\.\pipe\RPCSniffer
  1. Run python main.py with the server process to listen
    python main.py --help
    usage: main.py [-h] (-p PID | -n PROCNAME)
    main.py: error: one of the arguments -p/--pid -n/--procname is required
  1. go back to wireshark and click "start"
  2. from now you'll get all rpc messages in wireshark

Implementation

Check the wiki for more info.

TODO

This project is a POC for now, but you can help me add some stunning features that will allow us to really understand RPC internals.

Anyway, I'd be more than happy to receive bug reports, suggestions and anything else.

Some Comments