NetworkMiner is an open source Network Forensic Analysis Tool (NFAT) for Windows (but also works in Linux / Mac OS X / FreeBSD). NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.
NetworkMiner makes it easy to perform advanced Network Traffic Analysis (NTA) by providing extracted artifacts in an intuitive user interface. The way data is presented not only makes the analysis simpler, it also saves valuable time for the analyst or forensic investigator.
NetworkMiner has, since the first release in 2007, become a popular tool among incident response teams as well as law enforcement. NetworkMiner is today used by companies and organizations all over the world.
|NetworkMiner (free edition)||NetworkMiner Professional|
|Parse PCAP files|
|Parse PcapNG files|
|Extract files from FTP, TFTP, HTTP, HTTP/2, SMB, SMB2, SMTP, POP3 and IMAP traffic|
|Extract X.509 certificates from SSL encrypted traffic like HTTPS, SMTPS, IMAPS, POP3S, FTPS etc.|
|Decapsulation of GRE, 802.1Q, PPPoE, VXLAN, OpenFlow, SOCKS, MPLS and EoMPLS|
|Runs in Windows and Linux|
|OS Fingerprinting (*)|
|Audio extraction and playback of VoIP calls|
|OSINT lookups of file hashes, IP addresses, domain names and URLs|
Protocol Identification (PIPI)
|User Defined Port-to-Protocol Mappings (decode as)|
|Export to CSV / Excel / XML / CASE / JSON-LD|
|Configurable file output directory|
|Configurable time zone (UTC, local or custom)|
|Geo IP localization (**)|
|DNS Whitelisting (***)|
|Advanced OS fingerprinting|
|Web browser tracing (4:10 into this video)|
|Online ad and tracker detection|
|Host coloring support|
|Command line scripting support||(through NetworkMinerCLI)|
|PCAP parsing speed (****)||2.31 MB/s||1.49 MB/s (GUI version)
1.73 MB/s (command line version)
|Price||Free||$ 900 USD|
* Fingerprinting of Operating Systems (OS) is performed by using databases from Satori and p0f
** This product includes GeoLite data created by MaxMind, available from http://maxmind.com/
*** Domain names in the DNS tab are checked against the Alexa top 1,000,000 sites
**** Measured by loading dump.eth0.1059726000 from Defcon 11 (189MB) on a standard laptop with Intel Core i7 CPU (3.1GHz).
NetworkMiner can extract files, emails and certificates transferred over the network by parsing a PCAP file or by sniffing traffic directly from the network.
NetworkMiner showing files extracted from sniffed network traffic to disk
NetworkMiner showing thumbnails for images extracted to disk
User credentials (usernames and passwords) for supported protocols are extracted by NetworkMiner and displayed under the "Credentials" tab. The credentials tab sometimes also show information that can be used to identify a particular person, such as user accounts for popular online services like Gmail or Facebook.
Another very useful feature is that the user can search sniffed or stored data for keywords. NetworkMiner allows the user to insert arbitrary string or byte-patterns that shall be searched for with the keyword search functionality.
NetworkMiner Professional comes installed on a specially designed USB flash drive. You can run NetworkMiner directly from the USB flash drive since NetworkMiner is a portable application that doesn't require any installation. We at Netresec do, however, recommend that you copy NetworkMiner to the local hard drive of your computer in order to achieve maximum performance.
The latest version of NetworkMiner can be downloaded from:
» https://www.netresec.com/?download=NetworkMiner « (executable application)
SHA256 hash: 3f11dc812a9a3c84fafa29660e6142464582825569771e1f60bd6568e0269b23
» https://www.netresec.com/?page=NetworkMinerSourceCode « (source code)
SHA256 hash: dc6c45d7861cf4dd0b253a00f9908126c2dc29db7ec36f84e1008d251a2a1331
For older releases of NetworkMiner (prior to version 2.0), please visit the NetworkMiner page on SourceForge:
However, please note that we no longer release new versions of NetworkMiner on SourceForge.
|Version||Release Date||Major Improvements|
||JA3 hash extraction and parsers for the HTTP/2, DoH and CIFS browser protocol.|
||Username extraction from Kerberos traffic, ICS device fingerprinting and improved Linux support.|
||Improved email and VoIP call extraction.|
||VoIP call audio extraction and playback as well as OSINT lookups of file hashes, IP addresses, domain names and URLs.|
||Faster parsing speed (x2) and CASE export.|
||Improved HTTP parser.|
|NetworkMiner 2.1||2017-01-11||New protocols: POP3, IMAP, VXLAN, OpenFlow and SOCKS.|
|NetworkMiner 2.0||2016-02-09||New protocols: SMB2 and Modbus/TCP.|
|NetworkMiner 1.6||2014-06-16||Improved SMTP and DNS parsing.|
|NetworkMiner 1.5||2013-08-07||New protocols: PPPoE and LLMNR, fixed two vulnerabilities.|
|NetworkMiner 1.4||2012-08-16||New protocol: IEC 60870-5-104.|
|NetworkMiner 1.3||2012-04-12||Username and password from HTTP Digest Authentication (RFC 2617).|
|NetworkMiner 1.2||2011-11-19||New protocol: GRE, platform independent (works in Linux, Mac OSX etc).|
|NetworkMiner 1.1||2011-09-15||New protocol: PPP. Screen resolution, color depth, browser language and flash version extracted from Google Analytics.|
|NetworkMiner 0.71||2007-02-16||First public release of NetworkMiner.|