Analysing Various Packet Sniffing Tools

Similar documents
Lab VI Capturing and monitoring the network traffic

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Topics in Network Security

Own your LAN with Arp Poison Routing

Packet Sniffer A Comparative Study

When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING.

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

A Research Study on Packet Sniffing Tool TCPDUMP

2. HOW PACKET SNIFFER WORKS

Network Security: Workshop

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

NETWORK SECURITY WITH OPENSOURCE FIREWALL

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS

Introduction to Network Security Lab 2 - NMap

Packet Sniffing: What it s Used for, its Vulnerabilities, and How to Uncover Sniffers

Linux Network Security

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

A Protocol Based Packet Sniffer

Cain & Abel v 2.5. Password Cracking Via ARP Cache Poisoning Attacks. v.1. Page 1 of 15

Wireless Tools. Training materials for wireless trainers

Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA

Some Tools for Computer Security Incident Response Team (CSIRT)

EKT 332/4 COMPUTER NETWORK

Introduction to Network Security Lab 1 - Wireshark

WiFi Security Assessments

Packet Sniffer Detection with AntiSniff

information security and its Describe what drives the need for information security.

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Build Your Own Security Lab

Overview. Packet filter

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Intrusion Detection, Packet Sniffing

A radical approach to secure LAN network using novel hardening techniques

Post-Class Quiz: Telecommunication & Network Security Domain

Network Monitoring Tool with LAMP Architecture

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Packet Sniffer using Multicore programming. By B.A.Khivsara Assistant Professor Computer Department SNJB s KBJ COE,Chandwad

CTS2134 Introduction to Networking. Module Network Security

An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie

Practical Network Forensics

Information Security Training. Assignment 1 Networking

Packet Sniffer A Comparative Characteristic Evaluation Study

Wireless Encryption Protection

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Security Type of attacks Firewalls Protocols Packet filter


Network Security. Network Packet Analysis

Lab 1: Packet Sniffing and Wireshark

Sniffing in a Switched Network

Transformation of honeypot raw data into structured data

Network Monitoring and Traffic Analysis

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

Intrusion Detection Systems (IDS)

Network Forensics: Log Analysis

Wireless Security: Secure and Public Networks Kory Kirk

Solution of Exercise Sheet 5

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Wireshark Tutorial INTRODUCTION

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Packet Sniffing with Wireshark and Tcpdump

ITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark

Wireshark. Fakrul (Pappu) Alam

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

9 Simple steps to secure your Wi-Fi Network.

How To Use Ntop

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

Network System Design Lesson Objectives

Exam Questions SY0-401

Network Traffic Analysis

Figure 1. Wireshark Menu Bar

Network Connect Performance Logs on MAC OS

IPv6 Capable Security Assessment / Penetration Testing Tools

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

ARP Storm Detection and Prevention Measures

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Networking Basics and Network Security

Customer Tips. Network Packet Analyzer Tips. for the user. Purpose. Introduction to Packet Capture. Xerox Multifunction Devices.

1. LAB SNIFFING LAB ID: 10

Collecting information

Vulnerability Assessment and Penetration Testing

Course Title: Penetration Testing: Security Analysis

Introduction on Low level Network tools

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points

Passive Vulnerability Detection

Firewalls. Chapter 3

CS5008: Internet Computing

1. Firewall Configuration

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

1 Introduction to ntop

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments

Transcription:

Analysing Various Packet Sniffing Tools Inderjit Kaur 1, Harkarandeep Kaur 2, Er. Gurjot Singh 3 1, 2 Post Graduate, Department of Computer Science and Applications, KMV, Jalandhar, Punjab, India 3 Assistant Professor, Department of Computer Science and Applications, KMV, Jalandhar, Punjab, India 1 kaurinderjit35@gmail.com, 2 harkaranhothi@yahoo.com, 3 gurjotsingh52@yahoo.com Abstract: Packet sniffing is a technique of monitoring every packet on network. With the development and popularization of network technology, it is essential to secure the network technology becoming very essential because of the cyber attacks. We need to protection from unauthorized access and from hackers. Packet Sniffing is important in network monitoring to troubleshooting and to log network. Packet Sniffers are important for analysing over wire and wireless network. In this Paper, we focus on the basics of Packet Sniffing tools, how they work and their comparative study. Keyword: Packet Sniffer, Wireshark, Tcpdump, Nmap, Zenmap, Kismet, Caspa, Ntop, Dsniff, Cain and Abel, Etherape, Ethereal. I. INTRODUCTION Packet Sniffing is a methodology of monitoring every packet, which passes through the network. A packet sniffer can be a piece of software or hardware that examines all network traffic. The security threat showed by sniffers is their ability to capture all incoming and outgoing traffic, including clear-text passwords and usernames or other sensitive material [1]. There are so many commercial and non commercial tools are available that makes possible eavesdropping of network traffic [2]. In this paper we present practical approach to sniffing packets with some tools. This paper analyses the procedure of packet sniffing and packet logging. A. Working: When a computer sends a data to the network, it sends in the form of packets. These packets are the blocks of data that are actually directed to the certain deputed system. Every sent data has its receiving point. So, all the data are directly handled by specific computer. A system reads and receives only that data which is intended for it. The packet sniffing process involves a collaborate effort between the software and the hardware. This process is broken down into three steps. 1. Packet sniffer collects raw binary data from the wire. Normally this is done by switching the selected network Interface into unrestrained mode. 2. The collected binary data is converted into readable form. 3. The packet sniffer collected all data, verifies its protocol and begins its analysis [1]. IP and MAC address Packet Scanner Fig.1: Packet sniffer Fig.1 shows that with the help of ip and Mac address, we can gather the information of network traffic by using any packet scanner. II. NETWORK MONITORING TOOLS Network Traffic Information The packet sniffing tools analyse and filter the packets transmitted in the network. There are many packet sniffing tools. Some of them are as described as follows:- A. Wireshark: Wireshark is an open source packet filter. It is used for analyse the network traffic. Wireshark sees all traffic visible on that interface, not just traffic addressed to one of the interface s configured addresses and broadcast/multicast traffic. Wireshark is a tool that understands the structure of different networking protocols [3].Wireshark has the ability to capture all of those packets that are sent and received on the network and it can decode them for analysis. When you do anything on the Internet, such as browse websites, use VoIP, IRC etc, and the data is always converted into packets when it passes through your network interface or your LAN card. Wireshark will hunt for those packets in your TCP/ IP layer during the transmission and it will keep, and present this data, on GUI [4]. B. TCPDUMP: Tcpdump is a packet filter that runs on the command line interface. It displays TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Tcpdump run on the Unixlike operating systems: Linux, Solaris, BSD and Mac OS. Tcpdump analyses network behaviour, performance and applications that generate or receive network traffic [1]. TCPDUMP can do so many works like; TCPDUMP views the entire data portion of an Ethernet frame or other link layer protocol. TCPDUMP analyses and filter the IP packet and ARP packets or any protocol at a higher layer than Ethernet. C. Nmap: Nmap stands for network mapper. Nmap is an open source tool used to explore and audit the network. It can determine what hosts are available on the network, what services are enabled, operating system and the 65

version of the host,what type of firewalls are in place and many other aspects of the network using raw ip packets. Nmap is a command line tool. It can also be used by attackers to scan a network in order to harm it [5] NMAP can perform different types of scans such as: Connect SYN Stealth FIN, Xmas, Null Ping UDP Scan IP Protocol Scan ACK Scan Window Scan RPC Scan List Scan FTP Bounce D. Zenmap: Zenmap is a tool which is similar to nmap. It is an open source tool and easy to use as compared to nmap because it is on graphical user interface. The main difference between the nmap and zenmap is that nmap is command line and zenmap is GUI. Features of zenmap are as follows: a) Based on graphical user interface (GUI). b) Identifies the hosts on the network. c) Identifies the operating system. d) Easy to use as compared to nmap[6] The main thing about Zenmap is that it stores and sorts all the information gathered from any scans performed and allows us to build up a picture of our network. The easiest thing to do is a Ping scan to see what devices are alive on our network [7]. E. Kismet: Kismet is application is an open source wireless network analyser that run on Linux, UNIX and Mac OS X. It is not run on windows OS. Kismet is passive sniffer used to detect any wireless 802.11a/b/g protocol complaint network, even when the network has a non broadcasting hidden secure service set identifier. Kismet detects, log the IP range of any detected wireless network and reports it signal and noise levels. It can sniff all data packet from detected network. Kismet can be used to troubleshoot and optimize signals strength for access points and clients, as well as detect network intrusions. Kismet runs on GUI mode so it becomes very easy to use Kismet [8]. F. CASPA: CASPA runs on graphical user interface. It assists the user in the specification and in the analysis of cryptographic protocols. CASPA provides an editor for protocol specifications and offers a quick loading procedure for the protocols specified in underlying protocol libraries, and a convenient parsing procedure for userdefined protocol specifications. It gives us, the tool features of a graph management. This automatically generates and displays graphs. CASPA gives us a fully mechanized analyser that verifies secrecy and authenticity properties on a given graph and displays the results. More precisely, CASPA allows for analysing the security properties secrecy, weak authenticity, and strong authenticity [9]. G. Ntop: Ntop is a network traffic tool that tells us about the usage of the current network.using ntop helps us to better understand the status of the network. It displays a list of hosts that are currently using the network and shows information concerning the IP and Fiber Channel (FC) traffic generated by each host. NTOP is available for both UNIX as well as Win32-. NTOP supports the following protocols: TCP / UDP / ICMP (R)ARP IPX DLC APPLE TALK IPV4 / IPV6 NETBIOS AND MANY MORE [10]. H. Dsniff: DSNIFF is as password sniffer and a network traffic analysis tool. it can handle various protocols such as : FTP,SMTP,NNTP,HTTP,POP etc. It automatically detects each application protocol. Basically Dsniff is a collaboration of tools for auditing the network and penetration testing. This tool can be used for passive monitoring a network. it is a network sniffer but can also be used to disrupt the behaviour of switched network [11]. I. Cain and abel: Cain and Abel is basically a password recovery tool for MS-OS. It helps us to recover the passwords by sniffing the network. It can also crack encrypted passwords with the help of cryptanalysis attack, brute force attack etc. it is a powerful tool which deals with tough decryption algorithms. The latest version of this tool includes the features of ARP and man in middle attack. This tool can also capture and monitor the network traffic. 66

Features: It is capable for WEP cracking. It has the capability to record VoIP conversations It can do ARP spoofing. It can reveal the password boxes. It has the ability to crack SHA hashes. This tool is free to use [12]. J. Etherape: Etherape is packet filter tool which can also analyse the traffic. It was developed to use for UNIX. Etherape is free and open source software developed under GNU (General Public License). It displays the network traffic graphically. It shows us the colour-coded nodes and links with most used protocols. Traffic can be analyse end to end (IP) or port to port (TCP). It shows so many types of packets. Data view can be manipulated through a network filter. When we click on the node or link, it provides us the additional knowledge about protocols and network traffic. We can read the traffic from a file or on actual network. It handles the traffic on Ethernet, WLAN, VLAN and all other media. It supports both versions of internet protocols i.e. IPv4 and IPv6 [13]. K. EHTEREAL: Ethereal is a tool which is open source and is used to analyse the network traffic. It can also be called as packet sniffer. Ethereal is the original or real name of the wireshark tool [14].This tool is basically used to track and manage the network problems. Ethereal can run on different OS such as UNIX and windows. It can support more than 770 protocols. Disadvantage of this tool is that it cannot detect/troubleshoot the network problems. This tool is useful when we want to detect intrusion attempts. This tool is user friendly i.e. users can modify it according to their needs. Packets can be filtered after the capturing. Ethereal can be used in PPP, token ring, Ethernet etc [15]. B. Zenmap: Fig.2.NMAP III. ANALYSIS AND DISCUSSION In this section, we analyse network monitoring tools and how they sniff the packets in particular network. We work on monitoring tools like Wireshark, Nmap, Zenmap, Ethereal, and Etherape. A. NMAP: Nmap is a network mapper tool. It shows us the detail of a particular domain name and different ip addresses. We analyse the domain of google.com in the fig.2 and it shows the ip addresses of the domain google.com, open port. The command used is nmap v A www.google.com that run on terminal in Ubuntu O.S. Fig.3 Zenmap Zenmap is graphical interface of Nmap. It shows us the details of open ports as well as close ports of a particular IP address. Zenmap was executed and tested with an ip address (192.168.0.74) and the list of open and closed ports were generated. The snapshot for the same is shown in fig 3. 67

Tool s Name Table1. Analyzing different network monitoring tools Founder User interfac e Software license Wireshark Gerald Combs GUI Free Tcpdump Van Jacobson and team CLI Nmap Gordon Lyon CLI Zenmap Zenmap Team GUI Kismet Mike Kershaw (dragom) GUI Free GNU (general public ) GNU (general public) GPL Operating System Unix bases Caspa Colasoft LLC GUI Proprietary Microsoft Ntop Luca deri GUI GPLv3 Dsniff Dug Song CLI BSD Cain and Abel Massimiliano Montoro UNIX GUI Freeware Windows Etherape Juan Toledo GUI open Ethereal Gerald Combs CLI Both C. Wireshark UNIX Unix Wireshark is used to analyse the network traffic. It tells us about the source of the packet, its destination, protocol type, length, time.the above fig. 4 shows the result of network traffic filtered as per tcp. The following table1 shows the information about the various packet sniffing tools like their founder, about the user interface and operating system on which they easily execute. Wireshark is cross-, using the GTK+ widget toolkit to implement its user interface, and using pcap to capture packets; it runs on various Unix-like operating systems including Linux, Mac OS X, BSD, and Solaris, and on Microsoft Windows. IV. CONCLUSION In this paper we analyse various packet sniffing tools that monitor network traffic transmitted between legitimate users or in the network. The packet sniffer is network monitoring tool. It is opted for network monitoring, traffic analysis, troubleshooting, penetration testing and many other purposes. There are many tools which are used for network traffic sniffing but there are some limitations regarding these packet sniffing tools i.e. some tools are only used for packet capturing without any kind of analysing them. Therefore we need some another tools. Some tools trace IP packets and some tools only capture TCP packets. At the end, we concluded that with these tools, we can do intrusion detection and penetration testing against particular network. V. REFERENCES [1 Pallavi Asrodia\* and Hemlata Patel, Analysis of Various Packet Sniffing Tools for Network Monitoring and Analysis, International Journal of Electrical, Electronics and Computer Engineering vol.1 no.1 pp. 55-58(2012). [2] Rupam, Atul Verma and Ankita Singh, An Approach to Detect Packets Using Packet Sniffing, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.3, June 2013. [3] Borja Merino Febrero, TRAFFIC ANALYSIS WITH WIRESHARK INTECO-CERT,Instituto Nacional de Tecnologias de la Comunicacion, February 2011. [4] Wolf-Bastian P ottner, and Lars Wolf, IEEE 802.15.4 packet analysis with Wireshark and off-the-shelf hardware, Institute of Operating Systems and Computer Networks, Technische Universit at Braunschweig, Germany. Fig.4 Capturing tcp packets [5] Ekhator Stephen Aimuanmwosa, Evaluating Kismet and NetStumbler as Network Security Tools & Solutions, Blekinge Institute of Technology January 2010. 68

[6] Michael Backes, Stefan Lorenz, Matteo Maffei, and Kim Pecina Saarland University, Saarbrucken, Germany MPI-SWS, The CASPA Tool: Causality Abstraction for Security Protocol Analysis (Tool Paper). [7] Luca Deri and Stefano Suin, Practical Network Security: Experiences with ntop. 69