Network Security: Workshop



Similar documents
Lab VI Capturing and monitoring the network traffic

EKT 332/4 COMPUTER NETWORK

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

Wireshark Tutorial. Figure 1: Packet sniffer structure

Lab 1: Packet Sniffing and Wireshark

A Research Study on Packet Sniffing Tool TCPDUMP

Figure 1. Wireshark Menu Bar

Introduction to Network Security Lab 1 - Wireshark

Network Forensics Network Traffic Analysis

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA

Ethereal: Getting Started

Wireshark Tutorial INTRODUCTION

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

Wireshark Lab: Assignment 1w (Optional)

Packet Sniffer Detection with AntiSniff

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points

Working With Network Monitor Brian M. Posey and David Davis (WindowsNetworking.com)

Customer Tips. Network Packet Analyzer Tips. for the user. Purpose. Introduction to Packet Capture. Xerox Multifunction Devices.

Packet Sniffing with Wireshark and Tcpdump

Network Probe User Guide

BASIC ANALYSIS OF TCP/IP NETWORKS

Lab 1: Network Devices and Technologies - Capturing Network Traffic

Computer Networks/DV2 Lab

New York University Computer Science Department Courant Institute of Mathematical Sciences

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

Introduction to Wireshark Network Analysis

Sniffer s Network Packet Analyzer. Basics

Intrusion Detection, Packet Sniffing

Wireshark Quick-Start Guide. Instructions on Using the Wireshark Packet Analyzer

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

Computer Networks/DV2 Lab

WiFi Security Assessments

Network Agent Quick Start

6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS

Monitor network traffic in the Dashboard tab

How To Analyze Bacnet (Bacnet) On A Microsoft Computer (Barcnet) (Bcfnet) And Get A Better Understanding Of The Protocol (Bafnet) From A Microsatellite) (Malware)

Introduction to Passive Network Traffic Monitoring

Network Forensics: Log Analysis

Modern snoop lab lite version

Capture and analysis of the network traffic with Wireshark

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA

Cover. User Guide. (Enterprise Edition)

AP6511 First Time Configuration Procedure

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

User Manual. (Enterprise Edition)

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

Practical Network Forensics

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

6.0. Getting Started Guide

Broadband Phone Gateway BPG510 Technical Users Guide

Tcpdump Lab: Wired Network Traffic Sniffing

Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis

Network Traffic Analysis

Own your LAN with Arp Poison Routing

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Chapter 2 Quality of Service (QoS)

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

ACCESS 9340 and 9360 Meter Ethernet Communications Card ETHER

Packet Sniffer A Comparative Study

Wireshark Deep packet inspection with Wireshark

Packet Monitor in SonicOS 5.8

Configuring Security for FTP Traffic

Installing and Using Wireshark for Capturing Network Traffic

Firewall VPN Router. Quick Installation Guide M73-APO09-380

How to monitor network traffic inside an ESXi host

Multi-Homing Dual WAN Firewall Router

Sonicwall Reporting Server

UIP1868P User Interface Guide

Non-intrusive, complete network protocol decoding with plain mnemonics in English

Network Security. Network Packet Analysis

4m. MONITORING OF ETHERNET/IP NETWORK TRAFFIC.

Introduction to Analyzer and the ARP protocol

Computer Networking LAB 2 HTTP

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

A Protocol Based Packet Sniffer

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

How To Configure Voice Vlan On An Ip Phone

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

How To Gather Log Files On A Pulse Secure Server On A Pc Or Ipad (For A Free Download) On A Network Or Ipa (For Free) On An Ipa Or Ipv (For An Ubuntu) On Your Pc

Lab - Using Wireshark to View Network Traffic

Guideline for setting up a functional VPN

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

ITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark

Introduction. Interoperability & Tools Group. Existing Network Packet Capture Tools. Challenges for existing tools. Microsoft Message Analyzer

Analyzing your network traffic using a onearmed

vsphere Networking vsphere 5.5 ESXi 5.5 vcenter Server 5.5 EN

FortKnox Personal Firewall

CTS2134 Introduction to Networking. Module Network Security

visual packet analysis

ProCurve Switch ProCurve Switch

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

A DIY Hardware Packet Sniffer

Network Traffic Analysis and Intrusion Detection using Packet Sniffer

Transcription:

Network Security: Workshop

Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,, the data packets of common protocols and displays the network traffic in human- readable format Can be a standalone hardware device with specialized software, or it can simply be software that you install on your desktop or laptop 2

WireShark what is it good for Troubleshooting problems on the network Analyze performance to discover bottlenecks Network intrusion detection Logging network traffic for forensics and evidence Analyzing the operations of applications Discovering a faulty network card Discovering the origin of a Denial of Service (DoS( DoS) ) attack Detecting spyware. Detecting a compromised computer Validating compliance with company policy As an educational resource when learning about protocols For reverse-engineering engineering protocols in order to write clients and supporting programs 3

WireShark What not so good about it Capturing clear-text usernames and passwords Compromising proprietary information Capturing and replaying Voice over IP telephone conversations Mapping a network Passive OS fingerprinting 4

5

Ethernet historic assumptions All computers on the local network segment share the same cable broadcast Each packet has a header,, which is like an envelope containing the addresses of both the destination and source machine 6

Ethernet historic assumptions All of the other computers on the network segment see each packet, but if they are not the intended receiver They will disregard and discard it, unless a computer is running a sniffer Promiscuous mode NIC captures all of the traffic on the segment regardless of who it is being sent to 7

Ethernet Today Most Ethernet today do not share bus. Each computer in the network gets it own intended packets (and broadcasts) Promiscuous mode (should) not be relevant 8

So who's who? Each network component has a unique Media Access Control (MAC) address MAC is the individual identifier of each component MAC are (supposed) to be hard coded 48 bits 12 digit hexadecimal number 24 first bits identify the vendor 24 last bits identify are the serial 9

A little hardware Hub blindly forwards the information to all other computers connected to it This creates one-large broadcast (collision) domain Creates performance issue and sniffing very easy Switch looks at the packet header to locate the destination MAC address Maintains a list of all MAC addresses It can forward packets to specific ports This narrows the collision domain,, or broadcast domain to a single port 10

Lets not forget Port mirroring/spanning To mirror ports, you need to configure the switch to duplicate the traffic from a port you want to monitor to another port you are connected to with your sniffer Here an idea. Port mirror your uplink 11

Lets get down to business Wireshark down and dirty

WireShark FKA Ethereal GNU General Public License (GPL) It works in promiscuous and non promiscuous modes Captures data from Network or file Displays Data in ASCII/hex/C array Multi platform Supports hundreds of protocols Command line compatibilities 13

Capture and display filters The capture filter syntax follows the same syntax that Tcpdump uses from the libpcap library Display filters provide a powerful syntax to sort on traffic that is already captured 14

Capture and display filters Eq == Ne!= Gt > Lt < Ge >= Le <= And && Or Xor ^^ Not! [i:j]] i = start_offset,, j = length [i-j]] i = start_offset,, j = end_offset,, inclusive. [i] i = start_offset,, length = 1 [:j] start_offset = 0, length = j [i:] start_offset = i, end_offset = end_of_field 15

16

Filter Bar The Filter bar allows you to enter a filter string restricting which packets are displayed in the Summary Window To apply a filter, you have to enter the desired string into the Filter: Filter: text field and press Enter (or click the Apply button) Filter strings are case-sensitive sensitive Previously used filters can be easily recalled using the drop-down down list 17

Summary Window Columns Frame number The time from beginning of the Highest level source address. This will This field contains information that was within the capture. capture to the time when the frequently be the IP (Internet Highest determined level by destination the highest address. level Typically the highest level packet protocol This will was Protocol) source address, but may also be frequently decode to be the useful IP destination or informative as part decoded. Examples include captured user (in level seconds). the Media Access Control (MAC) address, of a summary but may for this also packet. protocols such as HyperText Transfer be the MAC Protocol address (HTTP), for layer File 2 (L2) Transfer Ethernet protocols, address for L2 Ethernet protocols, or Protocol or other address (FTP), Simple types for Mail other Transfer other address types for other protocols Protocol protocols (SMTP). (IPX, AppleTalk, etc ). (IPX, AppleTalk, etc). 18

Protocol tree window For each protocol there is a tree node summarizing the protocol, which can be expanded to provide the values in that protocol s s fields. The Protocol tree window allows you to examine the tree created by wireshark from decoding a packet. 19

20

Data view window Each row begins with a four-digit number representing the number of bytes the first octet in that row is offset from the beginning of the packet An octet is eight bits or one byte or two hexadecimal also known as hex digits The offset is then followed by sixteen two-character hexadecimal bytes The last item in each row is a series of sixteen ASCII characters representing the same 16 bytes from the packet. Not all bytes are conveniently displayable in ASCII. For those bytes a period (.) is substituted as a placeholder. 21

Bytes nr (in hex) between First Octet in Row and the Packet Beginning Data bytes (hex) Data Bytes (in ASCII) 22

Statistics Statistics Statistics We sniffed, captured and now what? 23

Statistics Summary Show information about the data captured Protocol hierarchy Display a hierarchical tree of protocol statistics Conversations Display a list of conversations (traffic between two endpoints) Endpoints Display a list of endpoints (traffic to/from an address) IO graph Display user specified graphs (e.g. the number of packets in the course of time) 24

Conversation List Statistics Display a list of conversations Endpoint List Display a list of endpoints Service Response Time Display the time between a request and the corresponding response ANSI, BOOTP-DHCP DHCP Display protocol specific statistics windows 25

Summary 26

Protocol Hierarchy 27

Conversation A network conversation is the traffic between two specific endpoints. For example, an IP conversation is all the traffic between two IP addresses. 28

End-point For each supported protocol, a tab is shown in this window. The tab labels shows the number of endpoints captured. If no endpoints of a specific protocol were captured, the tab label will be grayed out Each row in the list shows the statistical values for exactly one endpoint. 29

IO graph User configurable graph of the captured network packets. You can define up to five differently colored graphs. 30

What now? homework Download the dump files Follow the instructions Explain what is in each dump? enjoy 31