FakeNet-NG: Advanced Malware Analysis and Network Simulation
A dynamic network analysis tool called FakeNet-NG mimics network services and records network requests to help in malware research
Google expanded FakeNet-NG to provide HTML-based output that allows you to examine, explore, and share collected network data
An HTML page with inline CSS and Javascript supports the new interactive output of FakeNet-NG
The target system’s main component intercepts all incoming and outgoing network traffic
The Diverter keeps track of extra data, such as process IDs, names, and linkages between source ports that were started by the proxy and those that were started by the original
ModifyLocalDNS – direct the local machine’s DNS service to the DNS listener of FakeNet-NG
Present a more thorough overview of network activity by showcasing network data based on ICMP