{"id":1487,"date":"2009-01-28T18:22:37","date_gmt":"2009-01-28T16:22:37","guid":{"rendered":"http:\/\/www.corelan.be:8800\/?p=1487"},"modified":"2009-01-28T18:22:37","modified_gmt":"2009-01-28T16:22:37","slug":"monitoring-your-network-with-powershell","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/","title":{"rendered":"Monitoring your network with Powershell"},"content":{"rendered":"<p>I have written a small powershell script that will help you to monitor various hosts on your network.&nbsp;&nbsp; Instead of using ping to see if a host is alive, this script will connect to tcp ports, so you can also monitor hosts behind firewalls (or hosts that cannot be pinged).&nbsp; In addition to this, you can also test that a port is closed (and report that this is ok if that is what you want); and only report a problem when the port is found open (instead of closed)<\/p>\n<p>The script can be downloaded from the link at the bottom of this post.<\/p>\n<h3>This is how it works<\/h3>\n<p>1. <strong>Download the script<\/strong>, unzip it, and put it in a folder on a machine that<\/p>\n<ul>\n<li>has Powershell installed<\/li>\n<li>has access to the hosts you want to monitor<\/li>\n<\/ul>\n<p>2. <strong>Create a text file<\/strong> in the same folder, containing the hosts you want to monitor. You can only put one entry per line.&nbsp; This is the syntax :<\/p>\n<p>host:port:status (which can be \u2018open\u2019 or \u2018closed\u2019)<\/p>\n<p>so suppose you want to monitor a host called www.myserver.com and verify that port 80 is open, add a line that says<br \/>\nwww.myserver.com:80:open<\/p>\n<p>If you want to monitor port 22 of host server1.mydomain.com, which should be closed by default, add a line that says<br \/>\nserver1.mydomain.com:22:closed<\/p>\n<p>Note : You can group certain servers by adding a group title between square brackets.<\/p>\n<p>Example :<\/p>\n<div>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\">[<span style=\"color: #0000ff;\">internal<\/span> servers]\nwww.myserver.com:80:open\ndns.mydomain.com:53:open\nhost1.mydomain.com:139:open\nserver1.mydomain.com:22:closed\n\n[external servers]\nwww.mycompany.com:80:open<\/pre>\n<\/div>\n<p>3. Create a file called <strong>smtp.cfg <\/strong>and with the following entries (and replace the text surrounded by &lt;&gt; with your own settings)<\/p>\n<div>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\">smtpserver=&lt;ip address of your smtp server&gt;\nsmtpserverport=25\nfrom=&lt;email address&gt;\nto=&lt;emailaddress1,emailaddress2,&gt;\nsubject=[%hostname%] Port Monitor report (%events% <span style=\"color: #0000ff;\">event<\/span>(s)) - %timestamp%\nreportmode=2\nalertmode=1<\/pre>\n<\/div>\n<p>(all of the settings are mandatory)<\/p>\n<p>As you can see, you can use 3 variables in the Subject field. (and of course, you are free to build your own subject field.)<\/p>\n<p>Both \u201creportmode\u201d and \u201calertmode\u201d have 2 possible values :<\/p>\n<p>reportmode=1&nbsp; means : only show alert entries in the report<\/p>\n<p>reportmode=2&nbsp; means : show all entries in the report<\/p>\n<p>alertmode=1&nbsp; means : only send a report when something is wrong<\/p>\n<p>alertmode=2&nbsp; means : always send the report<\/p>\n<h3>How to use the script<\/h3>\n<p>You should have 3 files : the powershell script, the smtp.cfg file, and the file that contains the host entries.<\/p>\n<p>From a powershell command line, launch the script, and use the filename of the \u201chost entries\u201d file as parameter.&nbsp; The script will assume that smtp.cfg is in the local path.<\/p>\n<p>Let\u2019s say the hosts file is called hosts.txt and contains the following entries :<\/p>\n<p><a href=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2009\/01\/image145.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" style=\"display: inline;\" title=\"image\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2009\/01\/image-thumb145.png\" alt=\"image\" width=\"322\" height=\"186\"><\/a><\/p>\n<p>smtp.cfg is configured to send reports with all entries, to <a href=\"mailto:peter.ve@telenet.be\">peter.ve@telenet.be<\/a> and <a href=\"mailto:peter.ve@corelan.be\">peter.ve@corelan.be<\/a>, but only when there is something wrong (so alertmode = 1, reportmode = 2)<\/p>\n<p>Launch the script :<\/p>\n<table border=\"1\">\n<tbody>\n<tr>\n<td>\n<pre>c:\\scripts&gt; '.\\pve_portmonitor.ps1' hosts.txt\n\n---------------------------------\n pve_portmonitor.ps1\n Written by Peter Van Eeckhoutte\n https:\/\/www.corelan.be:8800\n---------------------------------\n\n[+] Reading input file\n  - Connecting to host www.corelan.be to verify that port tcp 8800 is open\n    Result : port is open\n  - Connecting to host freetools.corelan.be to verify that port tcp 80 is open\n    Result : port is open\n  - Connecting to host ftp.microsoft.com to verify that port tcp 21 is open\n    Result : port is open\n  - Connecting to host fw03.corelan.be to verify that port tcp 8888 is closed\n    Result : port is closed\n\n[+] Writing report to report.html<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The report is written to html, but no email is sent (because there are no unexpected results)<\/p>\n<p>When you set alertmode to 2, an email will be sent every time<\/p>\n<table border=\"1\">\n<tbody>\n<tr>\n<td>\n<pre>[+] Sending email to peter.ve@telenet.be,peter.ve@corelan.be\n    Done.<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The report looks like this :<\/p>\n<p><a href=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2009\/01\/image146.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" style=\"display: inline; border-width: 0px;\" title=\"image\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2009\/01\/image-thumb146.png\" alt=\"image\" width=\"652\" height=\"282\" border=\"0\"><\/a><\/p>\n<p>Of course, you would need to schedule this script in order to be able to continuously monitor the hosts on your network. You can use the explanation at the bottom of this post to find out how to launch the script from a batch file. All that is left for you is to&nbsp; schedule the batch file thru Task Scheduler \/ Scheduled Tasks.<\/p>\n<h3>Download the script<\/h3>\n<p>You need to be logged in to download this script. Click <a href=\"https:\/\/www.corelan.be\/wp-login.php?action=register\" target=\"_blank\" rel=\"noopener noreferrer\">this link<\/a> to register if you don\u2019t have a useraccount yet<\/p>\n<p>[download id=\"12\"]12[\/download]<\/p>\n<h3>Final notes<\/h3>\n<p>I don\u2019t mind that you use\/change this script to suit your own environment \u2013 but don\u2019t forget to give me some credits \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have written a small powershell script that will help you to monitor various hosts on your network.&nbsp;&nbsp; Instead of using ping to see if a host is alive, this script will connect to tcp ports, so you can also monitor hosts behind firewalls (or hosts that cannot be pinged).&nbsp; In addition to this, you &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Monitoring your network with Powershell\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[488,164,1440],"tags":[1300,632,484],"class_list":["post-1487","post","type-post","status-publish","format-standard","hentry","category-corelan-free-tools","category-networking","category-powershell-scripts","tag-powershell","tag-monitor","tag-free-tool"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Monitoring your network with Powershell - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Monitoring your network with Powershell - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"I have written a small powershell script that will help you to monitor various hosts on your network.&nbsp;&nbsp; Instead of using ping to see if a host is alive, this script will connect to tcp ports, so you can also monitor hosts behind firewalls (or hosts that cannot be pinged).&nbsp; In addition to this, you &hellip; Continue reading &quot;Monitoring your network with Powershell&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2009-01-28T16:22:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2009\/01\/image-thumb145.png\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/28\\\/monitoring-your-network-with-powershell\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/28\\\/monitoring-your-network-with-powershell\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Monitoring your network with Powershell\",\"datePublished\":\"2009-01-28T16:22:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/28\\\/monitoring-your-network-with-powershell\\\/\"},\"wordCount\":602,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/28\\\/monitoring-your-network-with-powershell\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2009\\\/01\\\/image-thumb145.png\",\"keywords\":[\"powershell\",\"monitor\",\"free tool\"],\"articleSection\":[\"Corelan Free Tools\",\"Networking\",\"Powershell\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/28\\\/monitoring-your-network-with-powershell\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/28\\\/monitoring-your-network-with-powershell\\\/\",\"name\":\"Monitoring your network with Powershell - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/28\\\/monitoring-your-network-with-powershell\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/28\\\/monitoring-your-network-with-powershell\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2009\\\/01\\\/image-thumb145.png\",\"datePublished\":\"2009-01-28T16:22:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/28\\\/monitoring-your-network-with-powershell\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/28\\\/monitoring-your-network-with-powershell\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/28\\\/monitoring-your-network-with-powershell\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2009\\\/01\\\/image-thumb145.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2009\\\/01\\\/image-thumb145.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/01\\\/28\\\/monitoring-your-network-with-powershell\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Monitoring your network with Powershell\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Monitoring your network with Powershell - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/","og_locale":"en_US","og_type":"article","og_title":"Monitoring your network with Powershell - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"I have written a small powershell script that will help you to monitor various hosts on your network.&nbsp;&nbsp; Instead of using ping to see if a host is alive, this script will connect to tcp ports, so you can also monitor hosts behind firewalls (or hosts that cannot be pinged).&nbsp; In addition to this, you &hellip; Continue reading \"Monitoring your network with Powershell\"","og_url":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2009-01-28T16:22:37+00:00","og_image":[{"url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2009\/01\/image-thumb145.png","type":"","width":"","height":""}],"author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Monitoring your network with Powershell","datePublished":"2009-01-28T16:22:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/"},"wordCount":602,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2009\/01\/image-thumb145.png","keywords":["powershell","monitor","free tool"],"articleSection":["Corelan Free Tools","Networking","Powershell"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/","url":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/","name":"Monitoring your network with Powershell - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/#primaryimage"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2009\/01\/image-thumb145.png","datePublished":"2009-01-28T16:22:37+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/#primaryimage","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2009\/01\/image-thumb145.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2009\/01\/image-thumb145.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2009\/01\/28\/monitoring-your-network-with-powershell\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Monitoring your network with Powershell"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":34600,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/1487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=1487"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/1487\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=1487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=1487"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=1487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}