Title: Introduction to Packet Sniffing using Ethereal 0.10.9
1Introduction to Packet Sniffingusing Ethereal
0.10.9
- Rob Bergin
- Network Engineer
- The Timberland Company
2Non-Technical
Currently Data just travels around your network
like a train. With a packet sniffer, get the
ability to capture the data and look inside the
packets to see what is actually moving long the
tracks.
3Technical
4Ethereal (and WinPcap)
Ethereal Application for Sniffing Packets
WinPcap open source library for packet capture
Operating System Windows Unix/Linux
NPF device driver Network Driver(WinPcap runs as
a protocol driver like TCP.SYS)
Network Card Drivers
5WinPcap Architecture
WinPcap is an open source library for packet
capture and network analysis for the Win32
platforms. It includes a kernel-level packet
filter, a low-level dynamic link library
(packet.dll), and a high-level and
system-independent library (wpcap.dll, based on
libpcap version 0.6.2). The packet filter is a
device driver that adds to Windows 95, 98, ME,Â
NT, 2000, XP and 2003 the ability to capture and
send raw data from a network card, with the
possibility to filter and store in a buffer the
captured packets. Packet.dll is an API that can
be used to directly access the functions of the
packet driver, offering a programming interface
independent from the Microsoft OS. Wpcap.dll
exports a set of high level capture primitives
that are compatible with libpcap, the well known
Unix capture library. These functions allow to
capture packets in a way independent from the
underlying network hardware and operating
system. WinPcap is released under a BSD-style
license.
Frame 1
6Ethereal Application
- Requires WinPcap for Captures
- Can run standalone to examine captures
7A Capture
- Lets define a capture as a period of time that
Ethereal captured data frames. - Frames can be assembled to examine application
traffic
Frame 1
Frame 2
Frame 3
Frame 4
Frame 5
Frame 6
8Recap
- Packet Sniffing
- Ethereal
- Data Frame Architecture
- WinPcap
- Network Capture
9Basic TCP/IP Stuff
10Interoperable TCP/IP
- TCP/IP is Transmission Control Protocol/Internet
Protocol) is a suite of network protocols. - TCP and IP are two separate protocols
- TCP handles the data (HTTP vs. FTP vs. Telnet)
- IP handles the data transmission (i.e. between
routers). - TCP/IP protocols were designed to allow different
applications running on dissimilar operating
systems to communicate across a network.
11Watch your Headers
- IP
- Addresses not Ports
- Layer 3 not 4
- 192.168.1.1 (octet)
12TCP
- TCP is connection-oriented transport layer
protocol designed to provide a reliable
connection for data exchange between two systems. - TCP ensures that all packets are properly
sequenced and acknowledged and that a connection
is established before data is sent. - TCP provides it reliability through the use of an
acknowledgement or ACK.
13TCP
- If a receiving system had to send an ACK for
every packet, the result would be an incredible
amount of overhead for the network. - To reduce the overhead, a mechanism called
windowing is used. - Windowing is a method of flow control.
14TCP
- The receiving system advertises a certain number
of packets that it can receive at a time (input
buffer size.) - The sending system watches for an ACK after the
designated number of packets is sent. - If an ACK is not received, data will be
retransmitted from the point of the last ACK.
15UDP
- UDP (User Datagram Protocol) provides an
unreliable, connectionless protocol to deliver
packets. - This protocol allows messages, called datagrams,
to be sent without the overhead of ACKs,
established connections, and sequencing. - Applications that use UDP as their communications
mechanism include NFS (2049), TFTP (79), DNS (53)
and Unreal Tournament (7777).
16IPv4
- IP (Internet Protocol) is used to handle datagram
services between hosts. - IP handles the addressing, routing, and
reassembly - IP addresses are 32 bits long, are organized into
4 octets (8 bits) separated by periods - IPv4 address examples 192.168.10.20.
- IPv6 is a next generation form of addressing.
17IPv6
- IP (Internet Protocol) is used to handle datagram
services between hosts. - IP handles the addressing, routing, and
reassembly - IP addresses are 32 bits long, are organized into
4 octets (8 bits) separated by periods - IPv4 address examples 192.168.10.20.
- IPv6 is a next generation form of addressing.
18What will IPv6 look like?
- IPv6 Addresses
- CDFE910A235657098475102439112021
- 208000000000000000907AEB1000123A
- Combo IPv4 and IPv6
- 1800000000007AEF0000000016.114.67.16
- Compacted IPv6 Address
- 2080000907AEB1000123A Legal compaction
- 2080907AEB1000123A Legal compaction
- 18007AEF0010724310 Legal compaction
19IPv4 vs. IPv6
- IPv4 RFC came out in 1981.
- IPv6 RFC came out in 1998.
Mobile Subscribers
PCs Connected to Web
Mobile Internet Users
Sources ABN AMRO/IDC/Ovum
20Recap
- TCP vs. IP
- Headers
- TCP
- UDP
- IP
- IPv4 vs. IPv6
21Ethereal Overview
22View of Ethereal
Packet List
Packet Details
Packet Bytes
23Packet List
Packet Order
Time Order
Destination IP
Information
Source IP
Protocol
24Packet Details
Source and Destination TCP Ports
Source and Destination IP
Breakdown of the Frame, the Packet, the TCP
portion
25Packet Bytes
View of the data Hexidecimal and Raw Data
26Ethereal Capture
27Running Ethereal
28Ethereal Analysis
29Logging on to FTP Server
30What Ethereal saw
31What Ethereal saw
32What Ethereal saw
33What Ethereal saw
34What Ethereal saw
35Ethereal Filtering.
36Filtering!!!!
37Saving Captures
- Captured Views
- Range of Packets
- All Packets
- Naming is critical
- Was it the client?
- Was it the Server?
38After Filter/Save/Open
39Time Column Delta
40FTP Only Filter
41Ethereal Packet Analysis
42What Username?
43Is Password Required?
44What Password?
45Why cant I log in?
46Follow the Stream
47Advanced Filtering
- Filter for just that stream
- (ip.addr eq 207.46.133.140 and ip.addr eq
172.17.22.56) and - (tcp.port eq 21 and tcp.port eq 3511)
- Filter for traffic between two hosts
- ip.addr 207.46.133.140 and ip.addr
172.17.22.56 - Filter for IP Traffic and removal of other
traffic - ip and !(nbns) and !(msnms) and !(browser) and
!(rip)
48Summary Info
49Ethereal Encryption
50HTTP
51HTTPS
52HTTP vs. HTTPS
53HTTP vs. HTTPS
54HTTP vs. HTTPS
55TCP Stream vs. HTML Source
56Ethereal Miscellaneous
57Protocol Hierarchy
58I/O Graphing
59HTTP Breakdown
60Coloring Packets
61Commercial Sniffers
- Sniffer Pro
-
- OmniPeek
-
- Observer
- IT Guru and ACE
62(No Transcript)
63Final Words
- If you cant measure it, you cant manage it
- - Peter Drucker