Provided by: libparse-netstat-perl_0.150-1_all bug

NAME

       Parse::Netstat::win32 - Parse the output of Windows "netstat" command

VERSION

       This document describes version 0.150 of Parse::Netstat::win32 (from Perl distribution
       Parse-Netstat), released on 2022-12-04.

SYNOPSIS

        use Parse::Netstat qw(parse_netstat);
        my $res = parse_netstat(output=>join("", `netstat -anp`), flavor=>"win32");

       Sample `netstat -anp` output:

        Active Connections

          Proto  Local Address          Foreign Address        State           PID
          TCP    0.0.0.0:135            0.0.0.0:0              LISTENING       988
          c:\windows\system32\WS2_32.dll
          C:\WINDOWS\system32\RPCRT4.dll
          c:\windows\system32\rpcss.dll
          C:\WINDOWS\system32\svchost.exe
          -- unknown component(s) --
          [svchost.exe]

          TCP    0.0.0.0:445            0.0.0.0:0              LISTENING       4
          [System]

          TCP    127.0.0.1:1027         0.0.0.0:0              LISTENING       1244
          [alg.exe]

          TCP    192.168.0.104:139      0.0.0.0:0              LISTENING       4
          [System]

          UDP    0.0.0.0:1025           *:*                                    1120
          C:\WINDOWS\system32\mswsock.dll
          c:\windows\system32\WS2_32.dll
          c:\windows\system32\DNSAPI.dll
          c:\windows\system32\dnsrslvr.dll
          C:\WINDOWS\system32\RPCRT4.dll
          [svchost.exe]

          UDP    0.0.0.0:500            *:*                                    696
          [lsass.exe]

       Sample result:

        [
          200,
          "OK",
          {
            active_conns => [
              {
                execs => [
                  "c:\\windows\\system32\\WS2_32.dll",
                  "C:\\WINDOWS\\system32\\RPCRT4.dll",
                  "c:\\windows\\system32\\rpcss.dll",
                  "C:\\WINDOWS\\system32\\svchost.exe",
                  "[svchost.exe]",
                ],
                foreign_host => "0.0.0.0",
                foreign_port => 0,
                local_host => "0.0.0.0",
                local_port => 135,
                pid => 988,
                proto => "tcp",
                state => "LISTENING",
              },
              {
                execs => ["[System]"],
                foreign_host => "0.0.0.0",
                foreign_port => 0,
                local_host => "0.0.0.0",
                local_port => 445,
                pid => 4,
                proto => "tcp",
                state => "LISTENING",
              },
              {
                execs => ["[alg.exe]"],
                foreign_host => "0.0.0.0",
                foreign_port => 0,
                local_host => "127.0.0.1",
                local_port => 1027,
                pid => 1244,
                proto => "tcp",
                state => "LISTENING",
              },
              {
                execs => ["[System]"],
                foreign_host => "0.0.0.0",
                foreign_port => 0,
                local_host => "192.168.0.104",
                local_port => 139,
                pid => 4,
                proto => "tcp",
                state => "LISTENING",
              },
              {
                execs => [
                  "C:\\WINDOWS\\system32\\mswsock.dll",
                  "c:\\windows\\system32\\WS2_32.dll",
                  "c:\\windows\\system32\\DNSAPI.dll",
                  "c:\\windows\\system32\\dnsrslvr.dll",
                  "C:\\WINDOWS\\system32\\RPCRT4.dll",
                  "[svchost.exe]",
                ],
                foreign_host => "*",
                foreign_port => "*",
                local_host => "0.0.0.0",
                local_port => 1025,
                pid => 1120,
                proto => "udp",
              },
              {
                execs => ["[lsass.exe]"],
                foreign_host => "*",
                foreign_port => "*",
                local_host => "0.0.0.0",
                local_port => 500,
                pid => 696,
                proto => "udp",
              },
            ],
          },
        ]

FUNCTIONS

   parse_netstat
       Usage:

        parse_netstat(%args) -> [$status_code, $reason, $payload, \%result_meta]

       Parse the output of Windows "netstat" command.

       Netstat can be called with "-n" (show raw IP addresses and port numbers instead of
       hostnames or port names) or without. It can be called with "-a" (show all listening and
       non-listening socket) option or without. And can be called with "-p" (show PID/program
       names) or without.

       This function is not exported by default, but exportable.

       Arguments ('*' denotes required arguments):

       •   output* => str

           Output of netstat command.

       •   tcp => bool (default: 1)

           Whether to parse TCP (and TCP6) connections.

       •   udp => bool (default: 1)

           Whether to parse UDP (and UDP6) connections.

       Returns an enveloped result (an array).

       First element ($status_code) is an integer containing HTTP-like status code (200 means OK,
       4xx caller error, 5xx function error). Second element ($reason) is a string containing
       error message, or something like "OK" if status is 200. Third element ($payload) is the
       actual result, but usually not present when enveloped result is an error response
       ($status_code is not 2xx). Fourth element (%result_meta) is called result metadata and is
       optional, a hash that contains extra information, much like how HTTP response headers
       provide additional metadata.

       Return value:  (any)

HOMEPAGE

       Please visit the project's homepage at <https://metacpan.org/release/Parse-Netstat>.

SOURCE

       Source repository is at <https://github.com/perlancar/perl-Parse-Netstat>.

AUTHOR

       perlancar <perlancar@cpan.org>

CONTRIBUTING

       To contribute, you can send patches by email/via RT, or send pull requests on GitHub.

       Most of the time, you don't need to build the distribution yourself. You can simply modify
       the code, then test via:

        % prove -l

       If you want to build the distribution (e.g. to try to install it locally on your system),
       you can install Dist::Zilla, Dist::Zilla::PluginBundle::Author::PERLANCAR,
       Pod::Weaver::PluginBundle::Author::PERLANCAR, and sometimes one or two other Dist::Zilla-
       and/or Pod::Weaver plugins. Any additional steps required beyond that are considered a bug
       and can be reported to me.

COPYRIGHT AND LICENSE

       This software is copyright (c) 2022, 2017, 2015, 2014, 2012, 2011 by perlancar
       <perlancar@cpan.org>.

       This is free software; you can redistribute it and/or modify it under the same terms as
       the Perl 5 programming language system itself.

BUGS

       Please report any bugs or feature requests on the bugtracker website
       <https://rt.cpan.org/Public/Dist/Display.html?Name=Parse-Netstat>

       When submitting a bug or request, please include a test-file or a patch to an existing
       test-file that illustrates the bug or desired feature.