Eiji James Yoshidaの記録

パケット作りが趣味のセキュリティ技術者の記録(2006年9月6日執筆開始)。当ブログはGoogle AnalyticsとAmazonアソシエイトを利用しています。

How to detect a promiscuous interface by using WMIC

You can detect a promiscuous interface if you use Windows Management Instrumentation Command-line (WMIC).
You don't need PromiscDetect and Promqry.

Supported OS

Windows XP Professional or later. (Vista/7/8/8.1/10)

Command

wmic /NAMESPACE:\\root\wmi PATH MSNdis_CurrentPacketFilter GET

NDIS_PACKET_TYPE

00000001     1      DIRECTED
00000010     2      MULTICAST
00000100     4      ALL_MULTICAST
00001000     8      BROADCAST
00010000     16     SOURCE_ROUTING
00100000     32     PROMISCUOUS

00001011     11     DIRECTED(1), MULTICAST(2), BROADCAST(8)
00101011     43     DIRECTED(1), MULTICAST(2), BROADCAST(8), PROMISC(32)

Non-promisc

C:\>wmic /NAMESPACE:\\root\wmi PATH MSNdis_CurrentPacketFilter GET
Active  InstanceName                             NdisCurrentPacketFilter
TRUE    Microsoft ISATAP Adapter                 0
TRUE    Teredo Tunneling Pseudo-Interface        0
TRUE    Intel(R) PRO/1000 MT Network Connection  11 <- Non-promisc
TRUE    WAN Miniport (Network Monitor)           0
TRUE    WAN Miniport (IP)                        0
TRUE    WAN Miniport (IPv6)                      0
TRUE    RAS Async Adapter                        0

Promisc

C:\>wmic /NAMESPACE:\\root\wmi PATH MSNdis_CurrentPacketFilter GET
Active  InstanceName                             NdisCurrentPacketFilter
TRUE    Microsoft ISATAP Adapter                 0
TRUE    Teredo Tunneling Pseudo-Interface        0
TRUE    Intel(R) PRO/1000 MT Network Connection  43 <- Promisc!!!
TRUE    WAN Miniport (Network Monitor)           0
TRUE    WAN Miniport (IP)                        0
TRUE    WAN Miniport (IPv6)                      0
TRUE    RAS Async Adapter                        0