Skip to content

otoriocyber/Util-EnumListeningProcesses

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

Util-EnumListeningProcesses

Overview

This PowerShell script is designed to help users identify and analyze processes listening on non-local interfaces on a Windows system. It retrieves information about the processes, such as the process name, ID, path and associated ports & network interfaces. Additionally, if available, it fetches details about the Windows Service related to those processes.

Example

Partial screenshot from PCS 7 OS Server results (with simple Excel formatting):

image

Usage

  • Output file is in a CSV format, recommanded to load into spreadsheet software such as Excel or Google Sheets.

Powershell

PS C:> .\EnumListeningProcesses.ps1 -OutputFile network_exposed_processes.csv

CMD

C:> Powershell -f EnumListeningProcesses.ps1 network_exposed_processes.csv