Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.
Man in the Middle Attack
Sniffing in a Switched Network -With A Recipe To Hack A Switch Using Ettercap and Ethereal -Manu GargManu Garg manugarg at gmail.
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Network Security Network Attacks and Mitigation 張晃崚 CCIE #13673, CCSI #31340 區域銷售事業處 副處長 麟瑞科技.
1 Eastern Michigan University Asad Khailany, Eastern Michigan University Dmitri Bagatelia, Eastern Michigan University Wafa Khorsheed, Eastern Michigan.
Network Attacks Mark Shtern.
Packet Sniffing - By Aarti Dhone.
Linux Networking TCP/IP stack kernel controls the TCP/IP protocol Ethernet adapter is hooked to the kernel in with the ipconfig command ifconfig sets the.
Misbehaving with Will Stockwell
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Sniffing the sniffers - detecting passive protocol analysers John Baldock, Intel Corp Craig Duffy, Bristol UWE.
An introduction to Network Analyzers Dr. Farid Farahmand 3/23/2009.
Wi-Fi Structures.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Computer Security and Penetration Testing
Demonstrating HTTP Session Hijacking through ARP Cache Poisoning and Man-in-the-Middle Attack and exploring HTTPS and VOIP session vulnerabilities Mainuddin.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
COEN 252: Computer Forensics Router Investigation.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
COEN 252 Computer Forensics
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Network Security: Lab#4-2 Packet Sniffers J. H. Wang Dec. 2, 2013.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Linux Networking and Security
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CHAPTER 9 Sniffing.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Network Programming All networked computers have an IP Address – Unique – In the form of xxx.xxx.xxx.xxx ( ) – 32 bits = ~4 billion possibilities.
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
0x440 Network Sniffing.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
MIS Week 9 Site:
Mobile Packet Sniffer Ofer Borosh Vadim Lanzman Dr. Chen Avin
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Packet Sniffing Hans Kokx
Fall  Computer Crimes  Operating System Identification  Firewalking 2.
Networks Fall 2009.
Jason Ewing Troy Behmer
Securing A Wireless Network
LAN Vulnerabilities.
Advanced Penetration testing
Packet Sniffers Lecture 10 - NETW4006 NETW4006-Lecture09.
Chapter 2: Basic Switching Concepts and Configuration
Wifi Hacking Wifi Protection
CIT 480: Securing Computer Systems
Wireshark LAN Monitoring HaganFox.net/NetSec Originally presented at
EVAPI - Enumeration Auburn Hacking club
Advanced Penetration testing
Presentation transcript:

Adrian Crenshaw

 I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m just a geek with time on my hands  (ir)Regular on the ISDPodcast

 Federal Wiretap Act  Wiretapping Law d_Sensibility_CGellis.pdf d_Sensibility_CGellis.pdf  Botnet Research, Mitigation and the Law

 A networking tool that lets you see what is on the wire or other networking medium  Lets you find network problems by looking at the raw packets/frames  AKA: Packet analyzers  Trademark of Network Associates Sniffer Network Analyzer

 General network diagnostics  Wireshark  Microsoft Network Monitor 3.4  TCPDump  Commview  Special purpose  Sniff passwords: Cain, Ettercap, Dsniff  IDS: Snort  Network forensics: NetworkMiner, Ettercap, P0f, Satori Many use libpcap/WinPcap libraries

 Find out where problems lie  Analyze protocols  Find plaintext protocols in use at your organization so you can discontinue their use  Telnet, HTTP, SMTP, SNMP, POP3, FTP, etc  Find rogue devices  Find traffic that should not exist (Why is there leet speak leaving my box?)

 Normal  Only frames destined for the NIC’s MAC address, and broadcasts, are passed up the network stack  Promiscuous mode  Lets you see traffic in your collision domain, even if it’s not destined for your MAC address  Some wireless card don’t support it  Monitor mode (RFMON)  Allows raw viewing of frames  Generally you have to use *nix (some exceptions)  ifconfig wlan0 down iwconfig wlan0 mode monitor ifconfig wlan0 up  Kismet!!!

 Plaintext protocols? At a hacker con?

Broadcast/Self Routed through me ARP poisoned Promiscuous Monitor mode

 Mirror port  TAP (Pics from Tony)  Own a box (Metasploit and others)  Pivotbox/Blackthrow/Dropbox/Kamikaze box/Svartkast  ARP Poison  Get in the route

 We’re going to need a bigger packet…

 tcpdump/dumpcap  tcpreplay  packeth  wlan2eth  nm2lp(NetMon to LibPcap)  Metasploit?

 On the local subnet, IPs are translated to MAC addresses using ARP (Address resolution Protocol)  ARP queries are sent and listened for, and a table of IPs to MACs is built (arp -a)  Pulling off a MITM (Man In The Middle) attack  If you MITM a connection, you can proxy it and sometime get around encryption  SSL  RDP  WPA

FritzCindy Cracker Switch Hey Cindy, I’m Fritz. Hey Fritz, I’m Cindy.

 Insert obscure D&D reference here ettercap -T –q –i eth0 -M ARP // //

 Brotherly Love?

 Be a router (Yersinia)  Rogue DHCP  Rogue access points (Karma)  DNS Poison  WPAD?

 RFCs are implemented differently by different vendors  Different window sizes  Different TTL  Different responses to probes  Different DHCP requests  Tools like P0f, Ettercap and Satori do passive OS finger printing  NetworkMiner combines them all!!

 No, not an underage Internet user.

 Baaaahh!!!

Articles:  Intro to Sniffers  Cain RDP (Remote Desktop Protocol) Sniffer Parser  Caffeinated Computer Crackers: Coffee and Confidential Computer Communications  The Basics of Arpspoofing/Arppoisoning  Fun with Ettercap filters

Videos:  Hacker Con WiFi Hijinx Video: Protecting Yourself On Potentially Hostile Networks presentation for the ISSA in Louisville Kentucky  DNS Spoofing with Ettercap  More Useful Ettercap Plugins For Pen-testing  Intro to the AirPcap USB adapter, Wireshark, and using Cain to crack WEP  Using Cain and the AirPcap USB adapter to crack WPA/WPA2  Passive OS Fingerprinting With P0f And Ettercap  Network Printer Hacking: Irongeek's Presentation at Notacon  Sniffing VoIP Using Cain  Cain to ARP poison and sniff passwords

Protection:  SSH Dynamic Port Forwarding  An Introduction to Tor  Encrypting VoIP Traffic With Zfone To Protect Against Wiretapping against-wiretapping against-wiretapping  Finding Promiscuous Sniffers and ARP Poisoners on your Network with Ettercap on-your-network-with-ettercap on-your-network-with-ettercap  DecaffeinatID: A Very Simple IDS / Log Watching App / ARPWatch For Windows windows windows

Tools:  Wireshark  Ettercap  Cain  NetworkMiner  Firesheep  Backtrack Linux

 Louisville Infosec  DerbyCon 2011, Louisville Ky  Skydogcon/Hack3rcon/Phreaknic/Notacon/Outerz0ne

42