Sniffing packets of specific binaries / apps / process id

dtracepacket-capturepacket-sniffertcpdumpwireshark

Is there a way to associate packets with executing binaries? I would be open to traditional sniffing methods or even dtrace for that matter.

I have a specific issue on a system with very high traffic. Sniffing "all" packets and filtering them is becoming a very burdensome problem and eliminating packet emission from all but the offending app is not possible in this scenario.

Best Answer

You don't mention what OS you're running on said system, but if it's running Windows you can use Microsoft Network Monitor, which shows the process ID for each "conversation" so it should allow you to focus your analysis. "Filtering" traffic per process ID is as simple as selecting the process in the left pane and viewing it's traffic in the right pane.

Related Topic