Ethernet-analyzer

Cards (52)

  • An Intro to Network Analyzers
  • References
    • "Introduction to Wiresharkl", Dr. Farid Farahmand, Fall 2014
    • "Packet analyzer", Wikipedia, March 2013
    • "Wireshark User's Guide", For Wireshark 1.99
    • "Wireshark Installation & packet Chapter", August 2011
  • Network Analysis & Sniffing
    Process of capturing, decoding, & analyzing network traffic
  • Why network analysis & sniffing is done
    • Why is the network slow
    • What is the network traffic pattern
    • How is the traffic being shared between nodes
  • Other names for network analysis & sniffing
    • traffic analysis
    • protocol analysis
    • sniffing
    • packet analysis
    • eavesdropping
  • Network Analyzer
    A combination of hardware & software tools what can detect, decode, & manipulate traffic on the network
  • Types of network analyzer operation
    • Passive monitoring (detection) - Difficult to detect
    • Active (attack)
  • Examples of network analyzers
    • Wireshark / Ethereal
    • Windump
    • Etherpeak
    • Dsniff
  • Sniffer
    A program that monitors the data traveling through the network passively
  • Read: Basic Packet-Sniffer Construction from the Ground Up! by Chad Renfro
  • Checkout his program: sniff.c
  • Network Analyzer Components
    • Hardware
    • Capture driver
    • Buffer
    • Real-time analysis
    • Decoder
  • Capture driver
    NIC Card - capturing the data
  • Buffer
    • memory
    • Special hardware devices
    • CRC & Parity Errors
    • Monitoring voltage fluctuation
    • Jitter (random timing variation)
    • Jabber (failure to handle electrical signals)
    • or disk-based
  • Real-time analysis
    Analyzing the traffic in real time; detecting any intrusions
  • Decoder
    Making data readable
  • Who uses network analyzers
    • System administrators
    • Malicious individuals (intruders)
    • Test engineers
  • System administrators use network analyzers to
    Identify system problems & Analyze performance
  • What malicious individuals use network analyzers for
    • Capture cleartext data
    • Passively collect data on vulnerable protocols
    • Mapping the target network
    • Traffic pattern discovery
    • Actively break into the network (backdoor techniques)
  • Vulnerable protocols
    • FTP
    • HTTP
    • IMAP
    • POP3
    • rlogin
    • SNTP
  • Test engineers use network analyzers to
    Generate traffic & thus act as the reference device
  • Port Monitoring
    The traffic to each port is mirrored to the sniffer
  • If you want to capture Ethernet traffic that is sent by host A to host B, & both are connected to a HUB, just attach a sniffer to this hub. All other ports see the traffic between hosts A & B.
  • On a SWITCH, after the host B MAC address is learned, unicast traffic from A to B is only forwarded to the B port. Therefore, the sniffer DOES NOT see this traffic.
  • Span port
    An extra feature that artificially copies unicast packets that host A sends to the sniffer port
  • Ways to protect against sniffers
    • Spoofing the MAC address
    • Detecting a sniffer in Linux
    • Detecting a sniffer in Windows
  • Remember: 00:01:02:03:04:05 MAC address (HWaddr) = Vender Address + Unique NIC #
  • Ways to protect against sniffers
    • Using switches
    • Using encryption
  • VPN Methods
    • Secure Shell (SSH): headers are not encrypted
    • Secure Sockets Layer (SSL): high network level packet security; headers are not encrypted
    • IPsec: Encrypted headers but does not use TCP or UDP
  • Remember: Never use unauthorized Sniffers at work!
  • Wireshark
    Formerly called Ethereal, an open source program with many features that decodes over 750 protocols
  • Wireshark components
    • TSHARK (CLI)
    • Editcap
    • Mergecap
    • Text2pcap
  • Editcap
    Similar to "Save As" to translate the format of captured packets
  • Mergecap
    Combines multiple saved captured files
  • Text2pcap
    Converts ASCII Hexdump captures & writes the data into a libpcap output file
  • Installing Wireshark
    1. Download from www.wireshark.org/download.html
    2. Install capture drivers
    3. Monitor ports & capture all traveling packets
  • If you did not succeed, search for "Wireshark" in the Ubuntu Dash and install, or go to Firefox and Google "Wireshark for Ubuntu 14.04" and follow the instructions.
  • Enabling root privileges for Wireshark
    1. sudo -s
    2. usermod -a -G wireshark your-user-name
    3. chgrp wireshark /usr/bin/dumpcap
    4. chmod 4750 /usr/bin/dumpcap
  • You can safely run Wireshark to inspect, edit or filter packet dumps without root privileges, e.g., wireshark -i eth0 -c 5
  • Ethernet
    Most popular protocol standard to enable computer communication, based on shared medium & broadcasting