Verifying Silk Performer DLL injection with Process Explorer.
In order to capture traffic from an application, Silk Performer will attempt to inject DLLs into the application under test.
DLL injection can often be stopped by security and antivirus software. When this happens, Silk Performer cannot capture the traffic and zero functions will be recorded.
We can check if Silk Performers DLL injection has been successful by using a tool from Microsoft called Process Explorer.
In this instance, Process Explorer is on the c:\ drive.
First we start recording the application with Silk Performer, in this case Firefox.
Next we launch Process Explorer from the command line.
After Process Explorer opens, we scroll down to find Firefox and click on the entry.
In the bottom pane we see a list of the DLLs currently being used with the application and the Company which owns them.
Here we see the 3 Silk Performer DLLs, all owned by 'Borland Software Corporation'.
In summary, if any of these DLLs are missing and the recorder is not picking up traffic, the most likely cause is security software.