Watching and Manipulating Your Network Traffic. tcpdump - your binoculars $ sudo tcpdump tcpdump: verbose output suppressed, use -v or -vv for full protocol.

Slides:



Advertisements
Similar presentations
Router Implementation Project-2
Advertisements

IP Forwarding Relates to Lab 3.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
OpenFlow overview Joint Techs Baton Rouge. Classic Ethernet Originally a true broadcast medium Each end-system network interface card (NIC) received every.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
8-1 Last time □ Network layer ♦ Introduction forwarding vs. routing ♦ Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding.
Network Management And Debugging
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
What’s New in Fireware XTM v Changes in Fireware XTM v  Routing table changes  Feature key global expiration for some XTMv keys  IP address.
CIS 193A – Lesson12 Monitoring Tools. CIS 193A – Lesson12 Focus Question What are the common ways of specifying network packets used in tcpdump, wireshark,
Linux Networking Commands
System Administration Network Tools. ping Test connectivity / latency (RTT) ICMP echo request/reply Variants ◦ARP ping  Send ARP instead  May also ping.
Training Ethernet and IP Basics Overview OSI Layer Model Ethernet IP ARP IP Routing Higher Layer Protocols VRRP ATM Vision Network Setup Practice.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Chapter 5 Link Layer and LANs
Network Layer – Subnetting and Control Protocols Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing,
1 ECE453 – Introduction to Computer Networks Lecture 12 – Network Layer (IV)
DHCP Dynamic Host Configuration Protocol Information management 2 Groep T Leuven – Information department 2/18 Agenda Introduction BOOTP.
IPv6 Transitioning Ram P Rustagi, ISE Dept, PESIT Mar 09-10, 2013.
Mr. Mturi Elias University Computing Centre SYSTEMS ADMIN TRAINING WORKSHOP.
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
TCP/IP Illustracted Vol1. 제목 : IP Routing ( 수 ) 한 민 규
IP Forwarding.
1 IP: putting it all together Part 1 G53ACC Chris Greenhalgh.
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
CDPA 網管訓練 駭客任務 2 Ethernet Switching ARP, IP, LAN, Subnet IP Header, Routing ICMP
Internet Ethernet Token Ring Video High Speed Router Host A: Client browser: REQUEST:http//mango.ee.nogradesu.edu/c461.
1 Tutorial 6: Networking Utilities & Firewall. 2 Internet Control Message Protocol (ICMP) designed to compensate for the deficiencies of IP protocol.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Компютърни Мрежи и GNU/Linux Боян Кроснов Мариян Маринов SiteGround LLC.
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
Hands On Networking IPv4 Routing Veena S (MCA Dept) Shruti Kadam, MCA Dept Arpita Kulkarni, MCA Dept June 28, 2012.
1 06/10/2008 ATecoM GmbH 1 Training Birdie Stefan Rudat.
IP network tools & troubleshooting AFCHIX 2010 Nairobi, Kenya October 2010.
Sniffer, tcpdump, Ethereal, ntop
Link Layer5-1 Synthesis: a “day” in the life of a web request  journey down protocol stack!  application, transport, network, link  putting-it-all-together:
TCP/IP Illustracted Vol1. 제목 : IP Routing ( 수 ) 한 민 규
Lecture 15 Internetworking: Address Structure Fragmentation and Reassembly.
0x440 Network Sniffing.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Ethernet switch Hosts Can talk using Ethernet addresses only.
Chapter 38 Initialization & Configuration. Bootstrapping occurs during boot up to obtain boot program which may then load operating system may use network.
Review of IPv4 Routing Veena S, MCA Dept, PESIT Mar 09-10, 2013.
1 Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example.
[Lab] IPv6 Tunnel 1. Create an Interconnected IPv4 Network 2 NB1 NB2 PC1 PC2 AP ICMP reachable between PC1-NB1 NB1-NB2 NB2-PC2.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
Some slides have been adapted from:
Link Layer 5.1 Introduction and services
A Typical Connection Scenario
sudo ./snull_load Two interfaces created: sn0, sn1
or call for office visit,
IP network tools & troubleshooting
Chapter 6: Network Layer
IP Network Layer and Ethernet Encapsulation
TCP/IP Networking An Example
Chapter 6 The Data Link layer
Some slides have been taken from:
TCP/IP Networking An Example
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
TCP/IP Networking An Example
Connecting to the Network
Synthesis A day in the life of a web request
Networking and Network Protocols (Part2)
IP Forwarding Relates to Lab 3.
WireGuard zswu.
Presentation transcript:

Watching and Manipulating Your Network Traffic

tcpdump - your binoculars $ sudo tcpdump tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 14:59: IP a deploy.akamaitechnologies.com.www > josiah-desktop.local.34594: : (1448) ack win :59: IP josiah-desktop.local > a deploy.akamaitechnologies.com.www:. ack 1448 win :59: IP a deploy.akamaitechnologies.com.www > josiah-desktop.local.34594:. 1448:2896(1448) ack 1 win :59: IP josiah-desktop.local > a deploy.akamaitechnologies.com.www:. ack 2896 win :59: IP ec compute-1.amazonaws.com.www > josiah-desktop.local.50615: P : (206) ack win 66 14:59: IP josiah-desktop.local > ec compute-1.amazonaws.com.www:. ack 206 win :59: IP ec compute-1.amazonaws.com.www > josiah-desktop.local.50615: F 206:206(0) ack 1 win 66 14:59: IP josiah-desktop.local > ec compute-1.amazonaws.com.www: F 1:1(0) ack 207 win 108 $ sudo tcpdump tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 14:59: IP a deploy.akamaitechnologies.com.www > josiah-desktop.local.34594: : (1448) ack win :59: IP josiah-desktop.local > a deploy.akamaitechnologies.com.www:. ack 1448 win :59: IP a deploy.akamaitechnologies.com.www > josiah-desktop.local.34594:. 1448:2896(1448) ack 1 win :59: IP josiah-desktop.local > a deploy.akamaitechnologies.com.www:. ack 2896 win :59: IP ec compute-1.amazonaws.com.www > josiah-desktop.local.50615: P : (206) ack win 66 14:59: IP josiah-desktop.local > ec compute-1.amazonaws.com.www:. ack 206 win :59: IP ec compute-1.amazonaws.com.www > josiah-desktop.local.50615: F 206:206(0) ack 1 win 66 14:59: IP josiah-desktop.local > ec compute-1.amazonaws.com.www: F 1:1(0) ack 207 win 108

A packet as seen by tcpdump 14:59: IP ec compute-1.amazonaws.com.www > josiah-desktop.local.50615:F 206:206(0) ack 1 win 66 19:56: arp who-has tell :57: IP > snmp: GetRequest(38) E:hp :58: IP > resolver1.opendns.com.domain: PTR? in-addr.arpa. (43) 19:58: IP resolver1.opendns.com.domain > : NXDomain 0/0/0 (43) 20:01: IP ntp > time7.apple.com.ntp: NTPv4, Client, length 48 20:09: IP > netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST

tcpdump examples tcpdump tcpdump -i eth1 tcpdump -c 25 > dump_to_file tcpdump host adam and not src eve tcpdump -n host adam or eve and port 80 and vlan 1 tcpdump -F filename host adam

If all else fails, pipe it to grep $ tcpdump | grep www

iproute2 - your swiss army knife Replaces ifconfig, route, iptunnel and others Sudo apt-get install iproute Setup nics and virtual nics Configure routing tables Setup multiple routing tables Set rules that restrict traffic flow Set rules that enable traffic flow Setup simple point-to-point tunnels Configure ARP table

Iproute – managing interfaces ip addr add /24 dev eth0 ip addr add /24 label eth0:1 dev eth0 ip address del

iproute - Routes ip route add default dev eth1 via ip route add /24 dev eth1:1 ip route delete (ip r d) ip route change (ip r c) ip route show (ip r s)

iproute - the routing table $ ip route sh table main dev eth0 scope link /24 dev eth0 proto kernel scope link src /24 dev eth0 proto kernel scope link src metric /16 dev eth0 scope link metric 1000 default via dev eth0

iproute Rules! ip rule add from unknown type unreachable priority 3000 ip rule add from enemy type blackhole priority 3001 ip rule add fwmark 1 table hide-the-good-stuff \ priority 3002 ip rule add from /24 to /24 \ type unreachable priority 3003

iproute - Tunnels ip addr add /30 label eth1:1 dev eth1 ip tunnel add my_tunnel mode ipip local / remote ttl 64 dev eth1 ip address add dev my_tunnel peer /32

iproute - neighbours $ ip neigh sh dev eth0 FAILED dev eth0 lladdr 00:1e:c9:dd:d8:b8 REACHABLE dev eth0 lladdr 00:50:da:21:8c:11 REACHABLE dev eth0 FAILED dev eth0 lladdr 00:11:2f:11:08:3e STALE

Thank You! Josiah Ritchie facebook.com/josiah.ritchie