Network Security. Network Packet Analysis



Similar documents
Network Security. Network Scanning

Lab Conducting a Network Capture with Wireshark

Lab VI Capturing and monitoring the network traffic

COMP416 Lab (1) Wireshark I. 23 September 2013

Introduction to Passive Network Traffic Monitoring

EXPLORER. TFT Filter CONFIGURATION

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Penetration Testing with Kali Linux

Customer Tips. Network Packet Analyzer Tips. for the user. Purpose. Introduction to Packet Capture. Xerox Multifunction Devices.

Computer Networks/DV2 Lab

Flow Analysis Versus Packet Analysis. What Should You Choose?

Multi-Homing Dual WAN Firewall Router

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Information Security Training. Assignment 1 Networking

COMPUTER NETWORK TECHNOLOGY (300)

Linux MDS Firewall Supplement

Network Traffic Analysis

I N S T A L L A T I O N M A N U A L

Collecting information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Networks and Security Lab. Network Forensics

Networking Basics and Network Security

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Hacking. Aims. Naming, Acronyms, etc. Sources

Wireshark. Fakrul (Pappu) Alam

Introduction to Network Security Lab 1 - Wireshark

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points

Connecting to and Setting Up a Network

EKT 332/4 COMPUTER NETWORK

Packet Sniffer A Comparative Study

NMS300 Network Management System

Introduction to Analyzer and the ARP protocol

CCT vs. CCENT Skill Set Comparison

VoIP Recorder V2 Setup Guide

CT LANforge WiFIRE Chromebook a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS

Lab 7: Introduction to Pen Testing (NMAP)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Cisco ASA, PIX, and FWSM Firewall Handbook

6.0. Getting Started Guide

Exam Questions SY0-401

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Wireshark Quick-Start Guide. Instructions on Using the Wireshark Packet Analyzer

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Websense Web Security Gateway: What to do when a Web site does not load as expected

Topics in Network Security

Network Probe User Guide

Lab 1: Network Devices and Technologies - Capturing Network Traffic

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Intego Enterprise Software Deployment Guide

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Chapter 4 Managing Your Network

GregSowell.com. Mikrotik Basics

Setting Up Scan to SMB on TaskALFA series MFP s.

Lab Objectives & Turn In

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Wireshark Tutorial INTRODUCTION

WiFi Security Assessments

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Lab Developing ACLs to Implement Firewall Rule Sets

1 You will need the following items to get started:

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Chapter 11 Phase 5: Covering Tracks and Hiding

Vulnerability Assessment and Penetration Testing

Access Point Configuration

Packet Capturing Options with Aruba Wireless Networks

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

FWSM introduction Intro 5/1

Linux MPS Firewall Supplement

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Automated Service Discovery for Enterprise Network Management

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance

Securing end devices

Network Security: Workshop

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

A Research Study on Packet Sniffing Tool TCPDUMP

Integrating a Hitachi IP5000 Wireless IP Phone

Solution of Exercise Sheet 5

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

Lab exercise: Working with Wireshark and Snort for Intrusion Detection

Lab Organizing CCENT Objectives by OSI Layer

Cyber Essentials. Test Specification

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

ITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

TP-LINK TD-W8901G. Wireless Modem Router. Advanced Troubleshooting Guide

Technical Support Information Belkin internal use only

Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis

Cisco S380 and Cisco S680 Web Security Appliance

Advanced Higher Computing. Computer Networks. Homework Sheets

A Guide to New Features in Propalms OneGate 4.0

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz

IxLoad-Attack: Network Security Testing

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

WhatsUpGold. v3.0. WhatsConnected User Guide

Transcription:

Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS kaw@cerias.purdue.edu 1

Network Packet Analysis Definition: Examining network packets to determine network-level activities and to diagnose errors. 2

Overview Network Packet Analysis Network Topology Capture Issues Wireshark features Wireshark capture and filters Exercises 3

Why packet analysis? Network packet analysis is very useful For finding network errors (malformed packets, runts, collisions, significant retransmissions, etc) Analyzing network throughput and load Finding rogue network systems Finding the source of significant network traffic (systems spewing packets, scanning, P2P, etc) Analyzing 802.11 systems for crowded channels, rogue access points, hidden SSIDs 4

Understanding TCP/IP Network packet analysis requires an understanding of low-level protocols 802.11 (WLAN), 802.3 (Ethernet) IP, TCP, UDP, ICMP, IGMP, HTTP, SMTP, SNMP, Telnet, SSH, SMB, etc 5

Where to listen On network switches, you can see packets to/from your system and broadcast packets To see all packets you need to connect to a mirroring port on the switch SPAN = Switched Port Analyzer (Cisco) RAP = Roving Analysis Port (3com) Transparent bridge mode Require two interfaces and OS support for bridge May require dedicated machine Ethernet Hub can be used as well 6

Regular Port 7

SPAN Port 8

Firewall Port 9

Transparent bridge 10

Where to wirelessly listen On wireless networks, you can see packets on the network you associate with, not other networks You can also enter a wireless monitor mode and listen 802.11 link layer packets Requires driver and card support WinPcap (Windows) has limited support Most Mac wireless cards work well 11

Associated Wireless 12

Monitor Mode Wireless 13

Software that interferes Some software on your Wireshark system may interfere with packet capture and interface selection Software firewalls and antivirus tools VPN Software 14

Performance issues Capturing packets can impact performance Packets may be dropped from capture file Solutions: Stop other programs that may use CPU A faster machine or more efficient interface card Use a capture-only tool (tcpdump, dumpcap) Optimize software settings 15

Tools Available Wireshark Network Packet Analyzer CAPSA Javvin Technologies, Inc. NetScout Network Packet Analysis Fluke Network Analyzers 16

Wireshark features Works on most platforms (Windows, Mac, Linux, UNIX systems) Live capture or offline analysis GUI or command-line interface VoIP analysis capabilities Colorization of packets and types Output packet data to various formats Capture filters Analysis and Statistics tools 17

Wireshark capture Select Capture -> Interfaces... Determine which interface on which you want to listen and select Start or Options 18

Wireshark capture options 19

Wireshark capture filters Select the preset capture filter Create a new filter 20

Wireshark main window 21

Filter expression tool Filter expression tool can create specific filters based on known protocols 22

Wireshark security issues Wireshark has had security issues due to programmer errors Captured packets can overflow buffers and lead to denial of service or remote execution of code You should always run the latest versions of Wireshark, WinPcap, and libpcap Avoid running Wireshark with admin privileges 23

Privileges & permissions WinPcap driver must loaded to capture Loaded at Wireshark start, needs Admin privileges Loaded at boot time Loaded and unloaded manually Wireshark can as user once WinPcap is loaded Mac OS X ChmodBBF tool will set /dev/bpf read permissions Wireshark can run as user Linux Must run with root privileges to capture packets 24

Wireshark performance Wireshark can use a lot of CPU attempting to capture packets Packets may be dropped from the capture file Solutions: See previous performance slide Use capture filters that select packets you want Don t Update Packets in Real Time Don t use read filters (command line option -R) Disable coloring rules Use smaller capture files Disable DNS and Transport Layer lookups 25

Exercise notes: The exercise wiki has links to the packet capture files for the exercises http://192.168.1.10/ Go to Exercises section and select Wireshark Exercises The files are labeled by exercise name 26

Exercise 1 Download exercise1 and open it in Wireshark Determine the activities from the packet data Determine the IP addresses of the systems involved 27

Exercise 2 Download exercise2 and open it in Wireshark Determine the activities from the packet data What port is open? How did you determine this? What is a short-cut? 28

Exercise 2 Additional Info The packets from the trace were from this: kaw@klaatu:~$ sudo nmap -ss -PN 192.168.1.10 [sudo] password for kaw: Starting Nmap 5.00 ( http://nmap.org ) at 2009-11-07 13:50 EST Interesting ports on nikto.interocitry.com (192.168.1.10): Not shown: 999 closed ports PORT STATE SERVICE 22/tcp open ssh MAC Address: 00:B0:D0:DB:9A:69 (Dell Computer) Nmap done: 1 IP address (1 host up) scanned in 7.13 seconds 29

Exercise 3 Download exercise3 and open it in Wireshark Determine the activities from the packet data What s the username involved? What s the password? What s the secret? 30

Exercise 4 Download exercise4 and open it in Wireshark Determine the activities from the packet data What web browser was used? What web server was used? What s the URL that was accessed? Without going to the URL, extract the image from the packet data and save it 31

Exercise 5 Download exercise5 and open it in Wireshark This is 802.11 traffic Find the number of conversations using the Statistics -> Conversation List -> WLAN tool What percentage of packets contain data? 32

Exercise 6 Open the Capture menu and select Interfaces... Choose start for the interface on which you want to capture packets Open a web browser and access the wiki Start an nmap scan on one of the target systems Experiment with the tools in the Analysis menu 33

End of Module 3 Questions? 34