TCP Table
Overview
Evidence: TCP Table Description: Collect TCP Table Category: Network Platform: Windows Short Name: tcpt Is Parsed: Yes - TCP table parsed into structured format Sent to Investigation Hub: Yes Collect File(s): No
Background
Windows maintains a table of all active TCP connections including local/remote addresses, ports, connection state, and the process ID that owns each connection.
Active TCP connections can reveal malware C2 communications, lateral movement, data exfiltration, and unauthorized network access in progress.
Data Collected
State
Connection state
5 (ESTABLISHED)
Local
Local IP address
192.168.1.100
LocalPort
Local port number
49152
Remote
Remote IP address
93.184.216.34
RemotePort
Remote port number
443
ProcessID
Owning process ID
1234
Collection Method
This collector uses Windows API to enumerate TCP connections:
GetExtendedTcpTable
withTCP_TABLE_OWNER_PID_ALL
flagIncludes all TCP connection states
Associates connections with process IDs
TCP states include: CLOSED, LISTEN, SYN_SENT, SYN_RECEIVED, ESTABLISHED, FIN_WAIT_1, FIN_WAIT_2, CLOSE_WAIT, CLOSING, LAST_ACK, TIME_WAIT.
Usage
Active TCP connections can reveal ongoing malicious activity. Investigators use this data to identify active C2 communications, detect data exfiltration in progress, track lateral movement connections, identify unauthorized remote access, correlate network activity with processes, and detect suspicious port usage.
Known Limitations
Point-in-time snapshot
Connections may terminate during collection
Short-lived connections may be missed
State captured at collection moment only
Notes
Cross-reference Process IDs with the Processes collector to identify which programs are making connections. Look for suspicious remote IPs, unusual ports, and connections from unexpected processes.
Last updated
Was this helpful?