Network sniffing packet capture and analysis

Similar documents
Network sniffing packet capture and analysis

tcpdump: network traffic capture

Lab VI Capturing and monitoring the network traffic

Figure 1. Wireshark Menu Bar

Network Traffic Analysis

Introduction to Network Security Lab 1 - Wireshark

Introduction to Passive Network Traffic Monitoring

COMP416 Lab (1) Wireshark I. 23 September 2013

Network Security: Workshop

A Research Study on Packet Sniffing Tool TCPDUMP

EKT 332/4 COMPUTER NETWORK

Packet Sniffer Detection with AntiSniff

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

Linux Network Security

Lab 1: Packet Sniffing and Wireshark

Packet Sniffing with Wireshark and Tcpdump

Safe network analysis

Topics in Network Security

USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA

ITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark

Customer Tips. Network Packet Analyzer Tips. for the user. Purpose. Introduction to Packet Capture. Xerox Multifunction Devices.

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

Introduction on Low level Network tools

Information Security Training. Assignment 1 Networking

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Wireshark Tutorial. Figure 1: Packet sniffer structure

Lab 1: Network Devices and Technologies - Capturing Network Traffic

Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC. Host based Analysis. {Himanshu Pareek,

A Protocol Based Packet Sniffer

6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS

How To Analyze Bacnet (Bacnet) On A Microsoft Computer (Barcnet) (Bcfnet) And Get A Better Understanding Of The Protocol (Bafnet) From A Microsatellite) (Malware)

Sniffer s Network Packet Analyzer. Basics

Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA

1. LAB SNIFFING LAB ID: 10

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Evidence Acquisition. Network Forensics. Jae Woong Joo

Course Title: Penetration Testing: Security Analysis

Computer Networks/DV2 Lab

Wireshark Tutorial INTRODUCTION

VisuSniff: A Tool For The Visualization Of Network Traffic

Network Monitoring Tool with LAMP Architecture

TCP Packet Tracing Part 1

Unix System Administration

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Introduction to Wireshark Network Analysis

Firewalls. October 23, 2015

CS197U: A Hands on Introduction to Unix

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Ethereal: Getting Started

Introduction to Analyzer and the ARP protocol

Wireshark Lab: Assignment 1w (Optional)

Snort Installation - Ubuntu FEUP. SSI - ProDEI Paulo Neto and Rui Chilro. December 7, 2010

Intrusion Detection Systems. Darren R. Davis Student Computing Labs

Transformation of honeypot raw data into structured data

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

EE984 Laboratory Experiment 2: Protocol Analysis

File Transfer Examples. Running commands on other computers and transferring files between computers

Sniffing in a Switched Network

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Packet Monitor in SonicOS 5.8

Packet Sniffing and Spoofing Lab

How To Test The Bandwidth Meter For Hyperv On Windows V (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2

Wireless Traffic Analysis. Kelcey Tietjen DF Written Report 10/03/06

Project 2: Firewall Design (Phase I)

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Network Security Management

Packet Sniffer A Comparative Study

Lab exercise: Working with Wireshark and Snort for Intrusion Detection

BASIC ANALYSIS OF TCP/IP NETWORKS

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: Contact:

New York University Computer Science Department Courant Institute of Mathematical Sciences

Overview. Protocol Analysis. Network Protocol Examples. Tools overview. Analysis Methods

Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Intrusion Detection, Packet Sniffing

INTRUSION DETECTION SYSTEMS and Network Security

DMZ Network Visibility with Wireshark June 15, 2010

Pen Test Tips 2. Shell vs. Terminal

Linksys RV042. TheGreenBow IPSec VPN Client. Configuration Guide.

Network Agent Quick Start

Wireshark. Fakrul (Pappu) Alam

Network Monitoring and Traffic Analysis

Who s Doing What? Analyzing Ethernet LAN Traffic

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

Computer Networking LAB 2 HTTP

Computer Networks/DV2 Lab

Capture and analysis of the network traffic with Wireshark

Transcription:

Network sniffing packet capture and analysis October 3, 2014 Administrative submittal instructions answer the lab assignment s 13 questions in numbered list form, in a Word document file. (13 th response is to embed a screenshot graphic.) email to csci530l@usc.edu exact subject title must be snifflab deadline is start of your lab session the following week reports not accepted (zero for lab) if late you did not attend the lab (except DEN or prior arrangement) email subject title deviates 1

DETER preparations coming soon next lecture topic will be done on DETER so will 3 of the 4 remaining thereafter you have an account created Wednesday late afternoon you received an advisory email at that time to-do for you in next 24 hours read your advisory email and note changes it requests you make within 72 hours (from Weds, 24 hours from now) Dateline Friday 9/26/14 while we were busy discussing exploits here * media drumbeat plagues us may be more sesationalized than necessary (or, maybe not) * footnote to last week s app security topic 2

Client unexgate gets server dmorgan.us s passwd file extraneous text would return passwd file if executed Packet sniffer A tool that captures, interprets, and stores network packets for analysis also known as network sniffer network monitor packet capture utility protocol analyzer is intimately network-y 3

Sniffing in security context an introductory counterpoint conventional wisdom hacking is emblematic of poplular security talk and is all about the outside menace popular conculsion: security is about networks reality the outside is there but don t forget the inside too!! does security vanish when net cable unplugged? Half of security unrelated to nets purely local dimensions physical security BIOS/bootloader security filesystem permissions execution jails encrypted filesystems etc network aspects packet sniffing remote backup and logging port scanning tunnels but today s topic is in the network category 4

Wireshark product background principal author Gerald Combs original name ethereal (changed 2006, legal reasons) open source equivalent linux and Windows versions Related software pcap the underlying library pcap captures the packets Wireshark displays them (graphically) tcpdump rides on pcap like Wireshark displays what pcap captures (character mode) very widespread others tshark, character mode version in Wireshark s stable Network Monitor - Microsoft snoop - Sun Microsystems ettercap snort 5

netcat product background a general purpose client and server there s more than one (hobbit s, GNU s) different authors different features different syntax cryptcat adds filestream en/de-cryption for you to generate something to send a server in this exercise ssh secure shell creates an encrypted network conversation for you to compare with an unencrypted one in this exercise by capturing both 6

Foundation concept: frames are what Wireshark is for capturing a.k.a. packets, datagrams, segments, protocol data units they come in nested groups Nesting / successive enveloping Russian laquer dolls 7

How data gets enveloped Packets Packets have detailed structure 8

Packets have detailed structure Wireshark knows the structures for ~1400 protocols turns byte dump into intelligible decode, in the details pane Wireshark interface components packet list pane packet details pane packet 6 s details packet bytes pane packet 6 s bytes 9

Stack correlation application transport network data link physical highest-layer protocol that each packet contains Wireshark taps interfaces probe takes measurement where it is sees whatever is at the interface (e.g, NIC) sees nothing else does not see what s on the network limits value on host connected to a switch (versus a hub) 10

It s s 70 o in L.A. No, it s 70 o right here There s s a port scan on the network wire shark No, there s a port scan right here 11

Two what-to to-capture restrictions Involuntary: can t capture what doesn t appear on the interface in the first place Voluntary: packet filter expressions Packet filter expressions using address primitives host 200.2.2.1 src host 200.2.2.2 dst host 200.2.2.2 ip[16]>=224 ip[2:2]>512 ether[0]&1=1 12

Packet filter expressions using protocol primitives ip tcp udp icmp Booleans and or not 13

2 different filters, 2 different syntaxes capture filters (during capture) shares same syntax as tcpdump uses display filters (after the fact) Wireshark s own syntax can auto-generate filter expression from model packet These syntaxes semantically same enter display filter here while displaying enter capture filter here before capturing 14

Wireshark SSL decrypt feature (given key!) with key without key but where do we get the key? info If you want to see network traffic besides your own make sure NIC is in promiscuous mode operate in a network with a hub, not a switch not your choice if you re not net admin use a switch with a management port that receives all traffic sniff by remote access on computers at other places in the network, save the capture to a file, transfer the file to Wireshark 15

info http://www.wireshark.org/ http://wiki.wireshark.org/ Packet Sniffing In a Switched Environment https://www.sans.org/reading-room/whitepapers/networkdevs/packetsniffing-switched-environment-244 SSL/TLS: What's Under the Hood https://www.sans.org/reading-room/whitepapers/authentication/ssl-tlswhats-hood-34297 16