What is the difference between pslist and tasklist




















Press Escape to abort. Include the -u switch with a username and password to login to the remote system if your security credentials do not permit you to obtain performance counter information from the remote system.

If you specify an account name and omit the -p option PsList prompts you interactively for a password. Thus: pslist 53 would dump statistics for the process with the PID Runs on: Client: Windows Vista and higher. Several tools are available to the investigator to retrieve this process-to-port mapping. On Windows XP and Windows , the netstat. As of Service Pack 2, Windows XP has an additional -b option that will "display the executable involved in creating each connection or listening port.

In some cases, the output will also show some of the modules DLLs used by the process. The output of the tool is easy to understand; however, you must run the tool from within an Administrator account to obtain its information.

By default, tcpvcon. Using the —a and — c switches, you can tell tcpvcon. Using the — n switch, you can tell tcpvcon. This output is very easy to parse using any number of tools. In general, you will want to obtain the IP address of the remote system s to specifically identify the system s. However, in some cases you may also want to document the domain name of the remote system since some intruders or malware authors use dynamic domain name system DNS servers and the name may be more useful over time than the IP address.

Keep in mind that tools such as tcpvcon. That being said, you may also opt to use a port scanning tool such as Nmap www.

In doing so, you could find a number of ports open in listening mode, awaiting connections; authentication services, Web servers, and File Transfer Protocol FTP servers do this, but so do backdoors. If you scan a system and find certain ports open but neither netstat nor any other tool that shows network connections or process-to-port mappings shows the same port open, you definitely have a mystery on your hands. At that point, you should double-check your scan results and ensure that you scanned the correct system.

Hey, it happens! If the issue persists, you could have a rootkit on your hands. Comparing a network traffic capture or port scan to the output of netstat. During one of my recent engagements, the customer had collected information from network traffic captures and perimeter device logs, and then mapped that information back to specific systems. Using the output of netstat. This also validated the fact that the systems were not infected with rootkits, which tend to try to hide such things as processes, files, network connections, and Registry keys.

A live system will have any number of running processes , and any one of those processes could be suspicious or malicious in nature. When a process is executed on a system, it is most often given the same name as the file where the executable image resides, and on Windows systems in particular a file can be named just about anything.

More often than not, they will rename the file to something less conspicuous, or they could try to disguise the intent of the program by using the name of a program usually found on Windows systems see the "Svchost" sidebar.

You can get this information by dumping the memory the process is using. Asked 2 years, 9 months ago. Active 2 years, 9 months ago. Viewed 4k times. Why is pslist so slow? Are there other alternatives? Improve this question. Maybe use the S switch? Figure 5 on this page I have never seen such delays: on my Win10 Pro system, pslist -t shows processes - it runs in ms.

I suggest you use other SysInternals utilities, such as ProcExp or ProcMon to find out what ps list is doing for such a long time.

Moab Switch -s seems like work as Unix top command, and does not really help here. I can see a Process Start at This is one of the most powerful commands you can use to gain visibility into an attackers actions on a victim system, whether they opened cmd. It is important to note that the MaxHistory value can be changed by right clicking in the top left of a cmd. The default is 50 on Windows systems, meaning the most recent 50 commands are saved.

The structures used by this plugin are not public i. They were reverse engineered by Michael Ligh from the conhost. In addition to the commands entered into a shell, this plugin shows:. Due to the scanning technique this plugin uses, it has the capability to find commands from both active and closed consoles. Similar to cmdscan the consoles plugin finds commands that attackers typed into cmd. The major advantage to this plugin is it not only prints the commands attackers typed, but it collects the entire screen buffer input and output.

The forensic investigator seems to have lost his mind and cannot find the dd. Nearly 20 typos later, he finds the tool and uses it. To display the version information embedded in PE files, use the verinfo command. Not all PE files have version information, and many malware authors forge it to include false data, but nonetheless this command can be very helpful with identifying binaries and for making correlations with other files.

This plugin only supports printing version information from process executables and DLLs, but later will be expanded to include kernel modules. This plugin enumerates imported and exported functions from processes, dlls, and kernel drivers.



0コメント

  • 1000 / 1000