Top Banner
Introduction to Packet Sniffing using Ethereal 0.10.9 Rob Bergin Network Engineer The Timberland Company
63

Introduction to Packet Sniffing using Ethereal 0.10.9

Jan 03, 2016

Download

Documents

alfreda-golden

Introduction to Packet Sniffing using Ethereal 0.10.9. Rob Bergin Network Engineer The Timberland Company. Non-Technical. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction to Packet Sniffing using Ethereal 0.10.9

Introduction to Packet Sniffingusing Ethereal 0.10.9

Rob Bergin

Network Engineer

The Timberland Company

Page 2: Introduction to Packet Sniffing using Ethereal 0.10.9

Non-Technical

Currently Data just travels around your network like a train. With a packet sniffer, get the ability to capture the data and look inside the packets to see what is actually moving long the tracks.

Page 3: Introduction to Packet Sniffing using Ethereal 0.10.9

Technical

Page 4: Introduction to Packet Sniffing using Ethereal 0.10.9

Ethereal (and WinPcap)

Ethereal – Application for Sniffing Packets

WinPcap – open source library for packet capture

Operating System – Windows & Unix/Linux

NPF device driver Network Driver(WinPcap runs as a protocol driver like TCP.SYS)

Network Card Drivers

Page 5: Introduction to Packet Sniffing using Ethereal 0.10.9

WinPcap Architecture

Frame 1

WinPcap is an open source library for packet capture and network analysis for the Win32 platforms. It includes a kernel-level packet filter, a low-level dynamic link library (packet.dll), and a high-level and system-independent library (wpcap.dll, based on libpcap version 0.6.2).

The packet filter is a device driver that adds to Windows 95, 98, ME,  NT, 2000, XP and 2003 the ability to capture and send raw data from a network card, with the possibility to filter and store in a buffer the captured packets. 

Packet.dll is an API that can be used to directly access the functions of the packet driver, offering a programming interface independent from the Microsoft OS.

Wpcap.dll exports a set of high level capture primitives that are compatible with libpcap, the well known Unix capture library. These functions allow to capture packets in a way independent from the underlying network hardware and operating system.

WinPcap is released under a BSD-style license.

Page 6: Introduction to Packet Sniffing using Ethereal 0.10.9

Ethereal Application

• Requires WinPcap for Captures • Can run standalone to examine captures

Page 7: Introduction to Packet Sniffing using Ethereal 0.10.9

A Capture

Frame 1 Frame 2 Frame 3 Frame 4 Frame 5 Frame 6

• Let’s define a capture as a period of time that Ethereal captured data frames.

• Frames can be assembled to examine application traffic

Page 8: Introduction to Packet Sniffing using Ethereal 0.10.9

Recap

• Packet Sniffing

• Ethereal

• Data Frame Architecture

• WinPcap

• Network Capture

Page 9: Introduction to Packet Sniffing using Ethereal 0.10.9

Basic TCP/IP Stuff

Page 10: Introduction to Packet Sniffing using Ethereal 0.10.9

Interoperable TCP/IP

• TCP/IP is Transmission Control Protocol/Internet Protocol) is a suite of network protocols.

• TCP and IP are two separate protocols

• TCP handles the data (HTTP vs. FTP vs. Telnet)

• IP handles the data transmission (i.e. between routers).

• TCP/IP protocols were designed to allow different applications running on dissimilar operating systems to communicate across a network.

Page 11: Introduction to Packet Sniffing using Ethereal 0.10.9

Watch your Headers

TCP / UDP- Ports not Addresses- Layer 4 not 3- FTP uses 20 and 21

IP- Addresses not Ports- Layer 3 not 4- 192.168.1.1 (octet)

Page 12: Introduction to Packet Sniffing using Ethereal 0.10.9

TCP

• TCP is connection-oriented transport layer protocol designed to provide a reliable connection for data exchange between two systems.

• TCP ensures that all packets are properly sequenced and acknowledged and that a connection is established before data is sent.

• TCP provides it reliability through the use of an acknowledgement or ACK.

Page 13: Introduction to Packet Sniffing using Ethereal 0.10.9

TCP

• If a receiving system had to send an ACK for every packet, the result would be an incredible amount of overhead for the network.

• To reduce the overhead, a mechanism called windowing is used.

• Windowing is a method of flow control.

Page 14: Introduction to Packet Sniffing using Ethereal 0.10.9

TCP

• The receiving system advertises a certain number of packets that it can receive at a time (input buffer size.)

• The sending system watches for an ACK after the designated number of packets is sent.

• If an ACK is not received, data will be retransmitted from the point of the last ACK.

Page 15: Introduction to Packet Sniffing using Ethereal 0.10.9

UDP

• UDP (User Datagram Protocol) provides an unreliable, connectionless protocol to deliver packets.

• This protocol allows messages, called datagrams, to be sent without the overhead of ACKs, established connections, and sequencing.

• Applications that use UDP as their communications mechanism include NFS (2049), TFTP (79), DNS (53) and Unreal Tournament (7777).

Page 16: Introduction to Packet Sniffing using Ethereal 0.10.9

IPv4

• IP (Internet Protocol) is used to handle datagram services between hosts.

• IP handles the addressing, routing, and reassembly

• IP addresses are 32 bits long, are organized into 4 octets (8 bits) separated by periods

• IPv4 address examples: 192.168.10.20.

• IPv6 is a next generation form of addressing.

Page 17: Introduction to Packet Sniffing using Ethereal 0.10.9

IPv6

• IP (Internet Protocol) is used to handle datagram services between hosts.

• IP handles the addressing, routing, and reassembly

• IP addresses are 32 bits long, are organized into 4 octets (8 bits) separated by periods

• IPv4 address examples: 192.168.10.20.

• IPv6 is a next generation form of addressing.

Page 18: Introduction to Packet Sniffing using Ethereal 0.10.9

What will IPv6 look like?IPv6 Addresses:CDFE:910A:2356:5709:8475:1024:3911:2021

2080:0000:0000:0000:0090:7AEB:1000:123A

Combo IPv4 and IPv61800:0000:0000:7AEF:0000:0000:16.114.67.16

Compacted IPv6 Address:2080:0:0:0:90:7AEB:1000:123A Legal compaction2080::90:7AEB:1000:123A Legal compaction1800::7AEF:0:0:1072:4310 Legal compaction

Page 19: Introduction to Packet Sniffing using Ethereal 0.10.9

IPv4 vs. IPv6

• IPv4 RFC came out in 1981.

• IPv6 RFC came out in 1998.

0

200

400

600

800

1000

1200

1400

1600

1995 1996 1997 1998 1999 2000 2001 2002 2003 2004

Millions

Mobile Subscriber

s

PCs Connectedto Web

MobileInternet

Users

Sources: ABN AMRO/IDC/Ovum

Page 20: Introduction to Packet Sniffing using Ethereal 0.10.9

Recap

• TCP vs. IP

• Headers

• TCP

• UDP

• IP

• IPv4 vs. IPv6

Page 21: Introduction to Packet Sniffing using Ethereal 0.10.9

Ethereal Overview

Page 22: Introduction to Packet Sniffing using Ethereal 0.10.9

View of Ethereal

Packet List

Packet Details

Packet Bytes

Page 23: Introduction to Packet Sniffing using Ethereal 0.10.9

Packet List Packet Order

Time Order

Source IP

Destination IP

Protocol

Information

Page 24: Introduction to Packet Sniffing using Ethereal 0.10.9

Packet Details

Breakdown of the Frame, the Packet, the TCP portion

Source and Destination IP

Source and Destination TCP Ports

Page 25: Introduction to Packet Sniffing using Ethereal 0.10.9

Packet Bytes

View of the data – Hexidecimal and Raw Data

Page 26: Introduction to Packet Sniffing using Ethereal 0.10.9

Ethereal Capture

Page 27: Introduction to Packet Sniffing using Ethereal 0.10.9

Running Ethereal

Page 28: Introduction to Packet Sniffing using Ethereal 0.10.9

Ethereal Analysis

Page 29: Introduction to Packet Sniffing using Ethereal 0.10.9

Logging on to FTP Server

Page 30: Introduction to Packet Sniffing using Ethereal 0.10.9

What Ethereal saw

Page 31: Introduction to Packet Sniffing using Ethereal 0.10.9

What Ethereal saw

Page 32: Introduction to Packet Sniffing using Ethereal 0.10.9

What Ethereal saw

Page 33: Introduction to Packet Sniffing using Ethereal 0.10.9

What Ethereal saw

Page 34: Introduction to Packet Sniffing using Ethereal 0.10.9

What Ethereal saw

Page 35: Introduction to Packet Sniffing using Ethereal 0.10.9

Ethereal Filtering.

Page 36: Introduction to Packet Sniffing using Ethereal 0.10.9

Filtering!!!!

Page 37: Introduction to Packet Sniffing using Ethereal 0.10.9

Saving Captures

• Captured Views• Range of Packets• All Packets• Naming is critical:

– Was it the client?– Was it the Server?

Page 38: Introduction to Packet Sniffing using Ethereal 0.10.9

After Filter/Save/Open

Page 39: Introduction to Packet Sniffing using Ethereal 0.10.9

Time Column & Delta

Page 40: Introduction to Packet Sniffing using Ethereal 0.10.9

FTP Only Filter

Page 41: Introduction to Packet Sniffing using Ethereal 0.10.9

Ethereal Packet Analysis

Page 42: Introduction to Packet Sniffing using Ethereal 0.10.9

What Username?

Page 43: Introduction to Packet Sniffing using Ethereal 0.10.9

Is Password Required?

Page 44: Introduction to Packet Sniffing using Ethereal 0.10.9

What Password?

Page 45: Introduction to Packet Sniffing using Ethereal 0.10.9

Why can’t I log in?

Page 46: Introduction to Packet Sniffing using Ethereal 0.10.9

Follow the Stream

Page 47: Introduction to Packet Sniffing using Ethereal 0.10.9

Advanced Filtering

Filter for just that stream

(ip.addr eq 207.46.133.140 and ip.addr eq 172.17.22.56) and (tcp.port eq 21 and tcp.port eq 3511)

Filter for traffic between two hosts

ip.addr == 207.46.133.140 and ip.addr == 172.17.22.56

Filter for IP Traffic and removal of other traffic

ip and !(nbns) and !(msnms) and !(browser) and !(rip)

Page 48: Introduction to Packet Sniffing using Ethereal 0.10.9

Summary Info

Page 49: Introduction to Packet Sniffing using Ethereal 0.10.9

Ethereal: Encryption

Page 50: Introduction to Packet Sniffing using Ethereal 0.10.9

HTTP

Page 51: Introduction to Packet Sniffing using Ethereal 0.10.9

HTTPS

Page 52: Introduction to Packet Sniffing using Ethereal 0.10.9

HTTP vs. HTTPS

Page 53: Introduction to Packet Sniffing using Ethereal 0.10.9

HTTP vs. HTTPS

Page 54: Introduction to Packet Sniffing using Ethereal 0.10.9

HTTP vs. HTTPS

Page 55: Introduction to Packet Sniffing using Ethereal 0.10.9

TCP Stream vs. HTML Source

Page 56: Introduction to Packet Sniffing using Ethereal 0.10.9

Ethereal: Miscellaneous

Page 57: Introduction to Packet Sniffing using Ethereal 0.10.9

Protocol Hierarchy

Page 58: Introduction to Packet Sniffing using Ethereal 0.10.9

I/O Graphing

Page 59: Introduction to Packet Sniffing using Ethereal 0.10.9

HTTP Breakdown

Page 60: Introduction to Packet Sniffing using Ethereal 0.10.9

Coloring Packets

Page 61: Introduction to Packet Sniffing using Ethereal 0.10.9

Commercial Sniffers

• Sniffer Pro

• OmniPeek

• Observer

• IT Guru and ACE

Page 62: Introduction to Packet Sniffing using Ethereal 0.10.9
Page 63: Introduction to Packet Sniffing using Ethereal 0.10.9

Final Words

“If you can’t measure it, you can’t manage it”

- Peter Drucker