Skip to content

Releases: H4NM/WhoYouCalling

WhoYouCalling v1.4 📄🛠️

06 Jan 20:38
Compare
Choose a tag to compare

This release mainly adresses issues such as race conditions and mapping of processes. I've also added a summary text file that provides with a slight overview of all of the processes that have network activity and the entire monitoring session. It can be useful for when there are a lot of processes with network activity and its faster to review one file than reviewing multiple folders.

✨ Features

  • Added a monitoring summary text file

📄 Changes

  • Change compiled executable name from WhoYouCalling.exe to wyc.exe - its a cli tool after all :-)
  • Changed file names to be shorter and more concise
  • Remove JSON flag and create the JSON file regardless to avoid scenarios of missing crucial data.
  • Change default process name when unable to sucesfully map it
  • Added a spinner wheel to filtering processes
  • Changed default values for process start and stop time, and executable name to null for cleaner and consistent data output
  • Added github actions to ensure that wyc can be compiled from the source code
  • Updated and cleaned up README to reflect the changes
  • Refactoring and cleaning code

🛠️ Fixes:

  • Fix so that the DNS wireshark filter folder is not created if there are no wireshark filters to be created
  • Fix issue where entire BPF filter was not written to file
  • Solve issue with short lived processes that perform DNS queries that do not have process names included.
  • Solve issue where the DNS ETW event registers the process PID before the process start ETW does, causes for adding a process twice.
  • Implement fix against race condition issue with short lived processes that perform DNS queries as they're labeled as unmapped processes.
    • This is done by checking if the unmapped process has the same PID as the correctly mapped process and if it was added to monitoring close to the same time
  • Solve issue for possible duplicate processname, indicating they're the same process, although launched separately and happend to get the same PID. Likely hood is very small but it could happen that would make results add to the same process even though they're separate.

🚀 Next up:

  • Adress code that produces build warnings
  • Add IP and domain lookup for analysis. This will also be complemented by a network graph visualization to see the entire hierarchy of processes and child processes and the related DNS queries and TCP activity

If you have any suggestions, feedback or bug reports. I'd love to hear them

Get-FileHash -path .\WhoYouCalling-1.4*-selfcontained.zip -algo sha256

Algorithm       Hash                                                                   Path                                                                                      
---------       ----                                                                   ----                                                                                      
SHA256          91B578CA10707B68D7D71116E2FD914B2C090D190FE3991AB518D8C856CF84BC       WhoYouCalling-1.4-x64-selfcontained.zip
SHA256          4A8B8C9DE18D436ACFE54A7EFD93089790B4B282832E98E7A7E21C1D2A3631E6       WhoYouCalling-1.4-x86-selfcontained.zip

WhoYouCalling v1.3.2 💡

07 Dec 01:07
2409d11
Compare
Choose a tag to compare

Features ✨:

  • Added third monitoring option called illuminate. By passing capital i flag (-I), WhoYouCalling records every TCPIP and DNS activity made by every running process on the machine. Can be used with packet capture. Ideally used for incident response, or simply when you're bored or curious for what processes are doing on your machine. This option is currently experimental so please report any issues that you may experience.
  • Changed the flag from --execnames to --names where a case insensitive pattern can be applied being checked towards processname and executable file name.
  • Enriched console output with spinner wheel and line indicating how many processes are being processed for outputting their results.
    (Updated the release for v1.3.1 and v1.3.2 to remove creating a filtered pcap based on the network traffic for all processes when using illuminate since that's not needed. I recommend using -s or --savefullpcap for retaining pcap with including traffic. Also added fail-safe handling for cataloging events that may be subjected to rare race condition events.

Get-FileHash -path .\WhoYouCalling-1.3*-selfcontained.zip -algo sha256

Algorithm       Hash                                                                   Path                            
---------       ----                                                                   ----                            
SHA256          1EF5FA3D51BA2282C9C709B7DECC48E896DF79C589729C86FC353D0DC6A0C712       WhoYouCalling-1.3.2-x64-selfcontained.zip
SHA256          6D1BD2E1E5A2497CD3CC22C92C87D224880221CD08D7711A83AF11713833400F       WhoYouCalling-1.3.2-x86-selfcontained.zip

WhoYouCalling v1.2 🛰️

20 Oct 20:00
468b147
Compare
Choose a tag to compare

Features ✨

  • A Wireshark filter is created per DNS response. In other words, when a process wants to communicate with example-domain.com, a DNS request is made for that domain to retrieve an IP-adresses to communicate with. The response for that requests, if it includes an IP-adress or more, will result in a Wireshark filter. This can be used with a generated pcap for that process, further helping in analysing process telemetry.
  • Added the command line of started processes. This provides additional insight to the use and intent of spawned processes, which may also fill in some gaps where some endpoints are communicated with or domain names being resolved.
  • Add output of assigned IP-adresses to interfaces to make it easier identify which interface to monitor for packet capture.
Get-FileHash -path .\WhoYouCalling-1.2-*-selfcontained.zip -algo sha256

Algorithm       Hash                                                                   Path
---------       ----                                                                   ----
SHA256          081AFC562CC9618C4CACE4A3407FF01BC374A9F2D8151266E62878F18EB63781       WhoYouCalling-1.2-x64-s...
SHA256          94F69313A677F7D33FCC1229C668326230A7DFDF3E8ADAC597E1E759F1722855       WhoYouCalling-1.2-x86-s...

#WhyMyLsassPingingReddit :suspect:

WhoYouCalling v1.1.1 🛠️

12 Oct 11:33
51d15d8
Compare
Choose a tag to compare

Added functionality to run without npcap drivers. This will of course not allow for packet capture, but it makes WhoYouCalling more lightweight and suitable for the cases where only understanding IF a process is reaching out and where is of importance, rather than seeing exactly what is being sent and/or received. To run without packet capture simply append the flag --nopcap. However, if you want packet capture, you can download the npcap drivers from here: https://npcap.com/#download

In the future only major and minor version updates will include release files. This was an exception as making the npcap drivers optional was worth the new release.

Get-FileHash -path .\WhoYouCalling-1.1.1-*-selfcontained.zip -algo sha256

Algorithm       Hash                                                                   Path
---------       ----                                                                   ----
SHA256          ABBEBD8DFB1F15782E84DDBE8B3B9E412A385CE98FD304F5C7E3FED85D59E178       WhoYouCalling-1.1.1-x64-s...
SHA256          5CA6BA74DC5487BD4B98395FFE91D54E280D1E79F1C01AA7519D2B87E9A8E5B8       WhoYouCalling-1.1.1-x86-s...

WhoYouCalling v1.1 🚀

07 Oct 21:40
e4983f5
Compare
Choose a tag to compare

Notable changes are the addition of two arguments. One for executing applications in an elevated state and the second being able to run them as another user. Please read the limitations part in the README.md to see exactly how it works. Also changed the flag of specifying the PID to captial P rather than lower case in order to conform to some form of standardization when providing username and password (-u and -p).

Note: To run WhoYoucalling, you need to have npcap installed on Windows. Download --> https://npcap.com/#download. If it's not installed it will complain that wpcap.dll is missing.

Get-FileHash -path .\WhoYouCalling-1.1-*-selfcontained.zip -algo sha256

Algorithm       Hash                                                                   Path
---------       ----                                                                   ----
SHA256          0AEDAFAB8EB49859C2C3C784648EE623EC51D50D2DB9925A7243746E1B0A4FCB   WhoYouCalling-1.1-x64-selfcontained.zip
SHA256          2A3EE815BA688FD1E29ADE9C4EBFFCE6861DC8293D188C0101208F829EDC77E1   WhoYouCalling-1.1-x86-selfcontained.zip

WhoYouCalling v1.0

29 Sep 19:18
Compare
Choose a tag to compare

First Release ✨ (1.0)

Note: You need to have npcap installed on Windows before running. Download --> https://npcap.com/#download. If it's not installed it will complain that wpcap.dll is missing.

In the future single binaries with statically packed libraries will be provided. The following releases are self contained and should be ready to for direct use.

sha256
WhoYouCalling-1.0-x64-selfcontained.zip: 9DBE3CAF6B01B2468727BB9D002613AD630BDD50FCC9D3E4153A9B13AE63417E
WhoYouCalling-1.0-x86-selfcontained.zip: EDEE00DC1D0B51AAC0295806AB68FB979E2B13A55E7197213E83A63C50A6742E