NAME
Parse::Netstat::win32 - Parse the output of Windows "netstat" command
VERSION
This document describes version 0.150 of Parse::Netstat::win32 (from Perl distribution Parse-Netstat), released on 2022-12-04.
SYNOPSIS
use Parse::Netstat qw(parse_netstat);
my $res = parse_netstat(output=>join("", `netstat -anp`), flavor=>"win32");
Sample `netstat -anp` output:
Active Connections
  Proto  Local Address          Foreign Address        State           PID
  TCP    0.0.0.0:135            0.0.0.0:0              LISTENING       988
  c:\windows\system32\WS2_32.dll
  C:\WINDOWS\system32\RPCRT4.dll
  c:\windows\system32\rpcss.dll
  C:\WINDOWS\system32\svchost.exe
  -- unknown component(s) --
  [svchost.exe]
  TCP    0.0.0.0:445            0.0.0.0:0              LISTENING       4
  [System]
  TCP    127.0.0.1:1027         0.0.0.0:0              LISTENING       1244
  [alg.exe]
  TCP    192.168.0.104:139      0.0.0.0:0              LISTENING       4
  [System]
  UDP    0.0.0.0:1025           *:*                                    1120
  C:\WINDOWS\system32\mswsock.dll
  c:\windows\system32\WS2_32.dll
  c:\windows\system32\DNSAPI.dll
  c:\windows\system32\dnsrslvr.dll
  C:\WINDOWS\system32\RPCRT4.dll
  [svchost.exe]
  UDP    0.0.0.0:500            *:*                                    696
  [lsass.exe]
Sample result:
[
  200,
  "OK",
  {
    active_conns => [
      {
        execs => [
          "c:\\windows\\system32\\WS2_32.dll",
          "C:\\WINDOWS\\system32\\RPCRT4.dll",
          "c:\\windows\\system32\\rpcss.dll",
          "C:\\WINDOWS\\system32\\svchost.exe",
          "[svchost.exe]",
        ],
        foreign_host => "0.0.0.0",
        foreign_port => 0,
        local_host => "0.0.0.0",
        local_port => 135,
        pid => 988,
        proto => "tcp",
        state => "LISTENING",
      },
      {
        execs => ["[System]"],
        foreign_host => "0.0.0.0",
        foreign_port => 0,
        local_host => "0.0.0.0",
        local_port => 445,
        pid => 4,
        proto => "tcp",
        state => "LISTENING",
      },
      {
        execs => ["[alg.exe]"],
        foreign_host => "0.0.0.0",
        foreign_port => 0,
        local_host => "127.0.0.1",
        local_port => 1027,
        pid => 1244,
        proto => "tcp",
        state => "LISTENING",
      },
      {
        execs => ["[System]"],
        foreign_host => "0.0.0.0",
        foreign_port => 0,
        local_host => "192.168.0.104",
        local_port => 139,
        pid => 4,
        proto => "tcp",
        state => "LISTENING",
      },
      {
        execs => [
          "C:\\WINDOWS\\system32\\mswsock.dll",
          "c:\\windows\\system32\\WS2_32.dll",
          "c:\\windows\\system32\\DNSAPI.dll",
          "c:\\windows\\system32\\dnsrslvr.dll",
          "C:\\WINDOWS\\system32\\RPCRT4.dll",
          "[svchost.exe]",
        ],
        foreign_host => "*",
        foreign_port => "*",
        local_host => "0.0.0.0",
        local_port => 1025,
        pid => 1120,
        proto => "udp",
      },
      {
        execs => ["[lsass.exe]"],
        foreign_host => "*",
        foreign_port => "*",
        local_host => "0.0.0.0",
        local_port => 500,
        pid => 696,
        proto => "udp",
      },
    ],
  },
]
FUNCTIONS
parse_netstat
Usage:
parse_netstat(%args) -> [$status_code, $reason, $payload, \%result_meta]
Parse the output of Windows "netstat" command.
Netstat can be called with -n (show raw IP addresses and port numbers instead of hostnames or port names) or without. It can be called with -a (show all listening and non-listening socket) option or without. And can be called with -p (show PID/program names) or without.
This function is not exported by default, but exportable.
Arguments ('*' denotes required arguments):
output* => str
Output of netstat command.
tcp => bool (default: 1)
Whether to parse TCP (and TCP6) connections.
udp => bool (default: 1)
Whether to parse UDP (and UDP6) connections.
Returns an enveloped result (an array).
First element ($status_code) is an integer containing HTTP-like status code (200 means OK, 4xx caller error, 5xx function error). Second element ($reason) is a string containing error message, or something like "OK" if status is 200. Third element ($payload) is the actual result, but usually not present when enveloped result is an error response ($status_code is not 2xx). Fourth element (%result_meta) is called result metadata and is optional, a hash that contains extra information, much like how HTTP response headers provide additional metadata.
Return value: (any)
HOMEPAGE
Please visit the project's homepage at https://metacpan.org/release/Parse-Netstat.
SOURCE
Source repository is at https://github.com/perlancar/perl-Parse-Netstat.
AUTHOR
perlancar <perlancar@cpan.org>
CONTRIBUTING
To contribute, you can send patches by email/via RT, or send pull requests on GitHub.
Most of the time, you don't need to build the distribution yourself. You can simply modify the code, then test via:
% prove -l
If you want to build the distribution (e.g. to try to install it locally on your system), you can install Dist::Zilla, Dist::Zilla::PluginBundle::Author::PERLANCAR, Pod::Weaver::PluginBundle::Author::PERLANCAR, and sometimes one or two other Dist::Zilla- and/or Pod::Weaver plugins. Any additional steps required beyond that are considered a bug and can be reported to me.
COPYRIGHT AND LICENSE
This software is copyright (c) 2022, 2017, 2015, 2014, 2012, 2011 by perlancar <perlancar@cpan.org>.
This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.
BUGS
Please report any bugs or feature requests on the bugtracker website https://rt.cpan.org/Public/Dist/Display.html?Name=Parse-Netstat
When submitting a bug or request, please include a test-file or a patch to an existing test-file that illustrates the bug or desired feature.