Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.
Man in the Middle Attack
Sniffing in a Switched Network -With A Recipe To Hack A Switch Using Ettercap and Ethereal -Manu GargManu Garg manugarg at gmail.
Tactics to Discover “Passive” Monitoring Devices
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Network Attacks Mark Shtern.
Packet Sniffing - By Aarti Dhone.
Linux Networking TCP/IP stack kernel controls the TCP/IP protocol Ethernet adapter is hooked to the kernel in with the ipconfig command ifconfig sets the.
Misbehaving with Will Stockwell
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Sniffing the sniffers - detecting passive protocol analysers John Baldock, Intel Corp Craig Duffy, Bristol UWE.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Wi-Fi Structures.
1 Reminding - ARP Two machines on a given network can communicate only if they know each other’s physical network address ARP (Address Resolution Protocol)
Computer Security and Penetration Testing
Demonstrating HTTP Session Hijacking through ARP Cache Poisoning and Man-in-the-Middle Attack and exploring HTTPS and VOIP session vulnerabilities Mainuddin.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
COEN 252 Computer Forensics
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Network Security: Lab#4-2 Packet Sniffers J. H. Wang Dec. 2, 2013.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Linux Networking and Security
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CHAPTER 9 Sniffing.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Network Programming All networked computers have an IP Address – Unique – In the form of xxx.xxx.xxx.xxx ( ) – 32 bits = ~4 billion possibilities.
LAN Switching and Wireless Basic Switch Concepts and Configuration.
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
sniffing Team #1. Easy to sniff To sniff wired communication, must connect the wire between sender and receiver. Because everybody shares the medium.
0x440 Network Sniffing.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
MIS Week 9 Site:
Mobile Packet Sniffer Ofer Borosh Vadim Lanzman Dr. Chen Avin
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Packet Sniffing Hans Kokx
Fall  Computer Crimes  Operating System Identification  Firewalking 2.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Networks Fall 2009.
Click to edit Master subtitle style
Jason Ewing Troy Behmer
LAN Vulnerabilities.
Packet Sniffers Lecture 10 - NETW4006 NETW4006-Lecture09.
Chapter 2: Basic Switching Concepts and Configuration
Wifi Hacking Wifi Protection
CIT 480: Securing Computer Systems
Firewalls Chapter 8.
EVAPI - Enumeration Auburn Hacking club
Advanced Penetration testing
Presentation transcript:

Adrian Crenshaw

 I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m just a geek with time on my hands  (ir)Regular on the ISDPodcast

 Federal Wiretap Act  Wiretapping Law d_Sensibility_CGellis.pdf d_Sensibility_CGellis.pdf  Botnet Research, Mitigation and the Law

 A networking tool that lets you see what is on the wire or other networking medium  Lets you find network problems by looking at the raw packets/frames  AKA: Packet analyzers  Trademark of Network Associates Sniffer Network Analyzer

 General network diagnostics  Wireshark  Microsoft Network Monitor 3.4  TCPDump  Commview  Special purpose  Sniff passwords: Cain, Ettercap, Dsniff  IDS: Snort  Network forensics: NetworkMiner, Ettercap, P0f, Satori Many use libpcap/WinPcap libraries

 Find out where problems lie  Find plaintext protocols in use at your organization so you can discontinue their use  Telnet, HTTP, SMTP, SNMP, POP3, FTP, etc  Find rogue devices  Find traffic that should not exist (Why is there leet speak leaving my box?)

 Normal  Only frames destined for the NIC’s MAC address, and broadcasts, are passed up the network stack  Promiscuous mode  Lets you see traffic in your collision domain, even if it’s not destined for your MAC address  Some wireless card don’t support it  Monitor mode (RFMON)  Allows raw viewing of frames  Generally you have to use *nix (some exceptions)  ifconfig wlan0 down iwconfig wlan0 mode monitor ifconfig wlan0 up  Kismet!!!

 We’re going to need a bigger packet…

 On the local subnet, IPs are translated to MAC addresses using ARP (Address resolution Protocol)  ARP queries are sent and listened for, and a table of IPs to MACs is built (arp -a)  Pulling off a MITM (Man In The Middle) attack  If you MITM a connection, you can proxy it and sometime get around encryption  SSL  RDP  WPA

FritzCindy Cracker Switch Hey Cindy, I’m Fritz. Hey Fritz, I’m Cindy.

 Insert obscure D&D reference here ettercap -T –q –i eth0 -M ARP // //

 Brotherly Love?

 Be a router (Yersinia)  Rogue DHCP  Rogue access points (Karma)  DNS Poison  WPAD?

 RFCs are implemented differently by different vendors  Different window sizes  Different TTL  Different responses to probes  Different DHCP requests  Tools like P0f, Ettercap and Satori do passive OS finger printing  NetworkMiner combines them all!!

 No, not an underage Internet user.

 Baaaahh!!!

Articles:  Intro to Sniffers  Cain RDP (Remote Desktop Protocol) Sniffer Parser  Caffeinated Computer Crackers: Coffee and Confidential Computer Communications  The Basics of Arpspoofing/Arppoisoning  Fun with Ettercap filters

Videos:  DNS Spoofing with Ettercap  More Useful Ettercap Plugins For Pen-testing  Intro to the AirPcap USB adapter, Wireshark, and using Cain to crack WEP  Using Cain and the AirPcap USB adapter to crack WPA/WPA2  Passive OS Fingerprinting With P0f And Ettercap  Network Printer Hacking: Irongeek's Presentation at Notacon  Sniffing VoIP Using Cain  Cain to ARP poison and sniff passwords

Protection:  SSH Dynamic Port Forwarding  An Introduction to Tor  Encrypting VoIP Traffic With Zfone To Protect Against Wiretapping against-wiretapping against-wiretapping  Finding Promiscuous Sniffers and ARP Poisoners on your Network with Ettercap on-your-network-with-ettercap on-your-network-with-ettercap  DecaffeinatID: A Very Simple IDS / Log Watching App / ARPWatch For Windows windows windows

Tools:  Wireshark  Ettercap  Cain  NetworkMiner  Firesheep  Backtrack Linux

 Louisville Infosec  DerbyCon 2011, Louisville Ky  Skydogcon/Hack3rcon/Phreaknic/Notacon/Outerz0ne

42