NetworkMiner – Passive Sniffer & Packet Analysis Tool for Windows

Outsmart Malicious Hackers


NetworkMiner is a passive network sniffer/packet capturing tool for Windows with an easy to use interface. It can detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis.

NetworkMiner makes use of OS fingerprinting databases from both p0f (by Michal Zalewski) and Ettercap (by Alberto Ornaghi and Marco Valleri) in order to do as correct passive OS fingerprinting as possible. NetworkMiner also uses the MAC-vendor list from Nmap (Fyodor).

The purpose of NetworkMiner is to collect data about hosts on the network rather than to collect data regarding the traffic on the network. The main view is host centric (information grouped per host) rather than packet centric (information showed as a list of packets/frames).

NetworkMiner can extract files transferred over the network by parsing a PCAP file or by sniffing traffic directly from the network. This is a neat function that can be used to extract and save media files (such as audio or video files) which are streamed across a network.


Another very useful feature is that the user can search sniffed or stored data for keywords. NetworkMiner allows the user to insert arbitrary string or byte-patterns that shall be searched for with the keyword search functionality.

A feature the author wants to include in future versions of NetworkMiner is to use statistical methods to do protocol identification (protocol fingerprinting) of a TCP session or UDP data. This means that instead of looking at the port number to guess which protocol is used on top of the TCP/UDP packet NetworkMiner will identify the correct protocol based on the TCP/UDP packet content. In this way NetworkMiner will be able to identify protocols even if the service is run on a non-standard port.

You can download NetworkMiner here:

NetworkMiner-0.82

Or you can read more here.

Posted in: Forensics, Hacking News, Networking Hacking, Windows Hacking

, , , , , , ,


Latest Posts:


StaCoAn - Mobile App Static Analysis Tool StaCoAn – Mobile App Static Analysis Tool
StaCoAn is a cross-platform tool which aids developers, bug bounty hunters and ethical hackers performing mobile app static analysis on the code of the application for both native Android and iOS applications.
snallygaster - Scan For Secret Files On HTTP Servers snallygaster – Scan For Secret Files On HTTP Servers
snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn't be public and can pose a s
Portspoof - Spoof All Ports Open & Emulate Valid Services Portspoof – Spoof All Ports Open & Emulate Valid Services
The primary goal of the Portspoof program is to enhance your system security through a set of new camouflage techniques which spoof all ports open and also emulate valid services on every port.
Cambridge Analytica Facebook Data Scandal Cambridge Analytica Facebook Data Scandal
One of the biggest stories of the year so far has been the scandal surrounding Cambridge Analytica that came out after a Channel 4 expose that demonstrated the depths they are willing to go to profile voters, manipulate elections and much more.
GetAltName - Discover Sub-Domains From SSL Certificates GetAltName – Discover Sub-Domains From SSL Certificates
GetAltName it's a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers.
Memcrashed - Memcached DDoS Exploit Tool Memcrashed – Memcached DDoS Exploit Tool
Memcrashed is a Memcached DDoS exploit tool written in Python that allows you to send forged UDP packets to a list of Memcached servers obtained from Shodan.


9 Responses to NetworkMiner – Passive Sniffer & Packet Analysis Tool for Windows

  1. Pantagruel February 27, 2008 at 11:06 am #

    Nice one. The first thing I thought was, p0f with an clickerdiclick interface. Definitely one piece of software to watch developing

  2. Le00 February 27, 2008 at 4:29 pm #

    That’s nice. Also check http://w3af.sourceforge.net. It’s a really good audit framework, that can be useful for pentests.

  3. eM3rC February 28, 2008 at 12:37 am #

    Huge potential for this piece of software. Like Pantagruel will be watching this develop.

  4. Pantagruel March 2, 2008 at 9:40 am #

    Took it for a test drive, it works very well and is indeed less intimidating than p0f

  5. James C March 6, 2008 at 3:20 pm #

    Works like a charm! love it.

  6. Pantagruel March 8, 2008 at 7:56 pm #

    NetworkMiner-0.83 was released 1st of march

  7. fever April 8, 2008 at 6:55 pm #

    sounds like something so keep your eyes on.

  8. Erik May 21, 2008 at 6:47 pm #

    I released version 0.84 this weekend. So NetworkMiner now supports passive OS fingerprinting through sniffing of DHCP packets (the previous versions only used TCP packets). Network Miner also supports WiFi sniffing of IEEE 802.11 WLAN traffic.

    I’ve updated the NetworkMiner Wiki at:
    http://networkminer.wiki.sourceforge.net/NetworkMiner

  9. Pantagruel May 22, 2008 at 10:01 pm #

    @Erik

    Thanks for the heads up, will take the new version for a test drive an see if the OS detection has become more acurate.