{"id":660370,"date":"2013-05-27T05:35:43","date_gmt":"2013-05-27T09:35:43","guid":{"rendered":"http:\/\/betanews.com\/?p=154637"},"modified":"2013-05-27T05:35:43","modified_gmt":"2013-05-27T09:35:43","slug":"dnsquerysniffer-shows-all-the-dns-traffic-on-your-system","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/660370","title":{"rendered":"DNSQuerySniffer shows all the DNS traffic on your system"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-74304 alignleft\" title=\"website magnifying glass www\" src=\"http:\/\/betanews.com\/wp-content\/uploads\/2012\/05\/website-magnifying-glass-www-300x199.jpg\" alt=\"\" width=\"300\" height=\"199\" \/>NirSoft has announced the public availability of <a title=\"DNSQuerySniffer\" href=\"http:\/\/www.downloadcrew.com\/article\/30341-dnsquerysniffer_10_64-bit\" >DNSQuerySniffer<\/a>, a tiny (130KB, including a Help file) network sniffer which detects and displays your DNS traffic.<\/p>\n<p>If you think this sounds just a little technical, then you\u2019re right, but the program does have some interesting applications. Malware will often use DNS traffic to communicate with its operators, for instance, and so taking a closer look at your own system may reveal the signs of an infection (a large number of failed lookups to domains you don\u2019t recognize, say).<\/p>\n<p>And more generally, DNSQuerySniffer helps to reveal which of your applications is trying to go online, and maybe what they\u2019re trying to do.<\/p>\n<p>The data capture itself can be done via WinPcap and Microsoft Network Monitor. But if you\u2019d rather not install anything else, the program also supports Raw Sockets capture, and this may produce acceptable results (the documentation provided with DNSQuerySniffer explains more).<\/p>\n<p>Any queries intercepted are displayed in full, with all the details you\u2019d expect: Host Name, Port Number, Query ID, Request Type, Request Time, Response Time, Duration, Response Code, Records Count, and the returned records.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-154639 alignright\" title=\"DNSQuerySniffer\" src=\"http:\/\/betanews.com\/wp-content\/uploads\/2013\/05\/DNSQuerySniffer-600x308.jpg\" alt=\"\" width=\"360\" height=\"185\" \/><\/p>\n<p>All of this data is displayed in a sortable table, and can be exported as a report in TXT, CSV, HTML and more.<\/p>\n<p>And as usual with NirSoft tools, while it\u2019s not something you\u2019ll use every day, <a title=\"DNSQuerySniffer\" href=\"http:\/\/www.downloadcrew.com\/article\/30341-dnsquerysniffer_10_64-bit\" >DNSQuerySniffer<\/a> is still a welcome complement to the more regular TCP\/IP connection monitors, and you should probably grab a copy for your networking and security toolkit.<\/p>\n<p><strong>Photo Credit:<\/strong> <a href=\"http:\/\/www.shutterstock.com\/gallery-507766p1.html\" >Yuriy Boyko<\/a>\/<a href=\"http:\/\/www.shutterstock.com\/\" >Shutterstock<\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.betanews.com\/~ff\/bn?a=g4ElenRzgkQ:02uGtXSmREg:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/bn?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.betanews.com\/~ff\/bn?a=g4ElenRzgkQ:02uGtXSmREg:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/bn?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/bn\/~4\/g4ElenRzgkQ\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NirSoft has announced the public availability of DNSQuerySniffer, a tiny (130KB, including a Help file) network sniffer which detects and displays your DNS traffic. If you think this sounds just a little technical, then you\u2019re right, but the program does have some interesting applications. Malware will often use DNS traffic to communicate with its operators, [&hellip;]<\/p>\n","protected":false},"author":7429,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-660370","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/660370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/7429"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=660370"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/660370\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=660370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=660370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=660370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}