Download presentation
Presentation is loading. Please wait.
Published byClarissa Jennings Modified over 9 years ago
1
1 The Main Event Battle Of the Sniffers
2
● The Champion – Ethereal: Network Analyzer ● The Challenger – Ettercap: Network Security Suite
3
A look at Ettercap ● Ettercap: Features – Packet Sniffing ● Unified Sniffing ● Bridged Sniffing – Logging – Real Time Data Views ● Live Connections / Man-in-the-Middle
4
A look at Ettercap ● Ettercap: Requirements ● Unix Based OS ● Windows NT/2000/Server 2003 ● Libraries – libpcap 0.81 or higher – libnet 1.2.1.1 or higher – libpthread – zlib – Optional: GTK+, Ncurses, OpenSSL
5
A look at Ettercap ● Ettercap: Installation – Website Download Available at: ● http://ettercap.sourceforge.net/ http://ettercap.sourceforge.net/ – Linux Installation ● Decompress using tar/gzip ●./configure.sh ● make ● make install
6
A look at Ettercap ● Ettercap: The GUI – Ncurses GUI ● Main Window
7
Using Ettercap ● Getting ready to sniff – Select ”Sniff” – Select ”Unified Sniffing”
8
Using Ettercap ● Sniffing Screen
9
Using Ettercap ● Performing the Sniff – Select ”Start” – Select ”Start Sniffing” – Press ”ENTER” – Stop the Sniff by selecting ”Stop Sniffing”
10
Using Ettercap ● Features While Sniffing: – Statistics. – Select ”View” then ”Statistics” – Results updated in real time.
11
Using Ettercap ● Features While Sniffing: – Connection View – Select ”View” then ”Connections” – Results updated in real time.
12
Using Ettercap ● Features While Sniffing: – Connection Details – Choose a connection in the Live Connections list and press ”ENTER” – Results updated in real time.
13
Using Ettercap ● More Features: – Host Scanning and targeting. – Plug-In System. – Logging. – Inject Information
14
The Sniffing Experiment ● Three Trials – HTTP Request / Response – Secure HTTP Request / Response – FTP Transaction ● Testing Platform – Pentium 3 Linux Computer – Fedora Core 2
15
First Trial: HTTP Transaction ● Website: www.kmaxmedia.comwww.kmaxmedia.com ● Ethereal – Showed very detailed information about each packet. – Setup of Connection – Request / Response – Closure of Connection – Also showed every packet that was used in the transaction.
16
First Trial: HTTP Transaction ● Ethereal
17
First Trial: HTTP Transaction ● Ettercap – Successful in sniffing the request and response. – But Ettercap would only sniff the payload. – Doesn't capture packet information. – Indications of timed caching of information. ● Due to this, sometimes would erase the information.
18
First Trial: HTTP Transaction ● Ettercap
19
Second Trial: HTTPS Transaction ● Web Site: CIBC Kaleem's Bank Account
20
Second Trial: HTTPS Transaction ● Both sniffers were unable to show the plaintext. – 128-Bit Encryption at work. – Ettercap does have a feature to allow it to give a fake certificate for an attack but the environment was not ideal. ● However, Ethereal recognized the public key used.
21
Second Trial: HTTPS Transaction ● Ethereal
22
Second Trial: HTTPS Transaction ● Ettercap
23
Third Trial: FTP Transaction ● An FTP login was performed on ftp.kmaxmedia.com. This included a username and password. ftp.kmaxmedia.com ● Both sniffers were able to successful get the username and password information. But the presentation of the information was different. ● Information was more readable in Ettercap.
24
Third Trial: FTP Transaction ● Ethereal
25
Third Trial: FTP Transaction ● Ethercap
26
The Battle: Some Observations ● During the Sniffing ● Ethereal would only show statistics on the type of packets sniffed while Ettercap would show statistics, profiles, connections and more in real time. ● Any personal authentication information that is heard on the wire, ettercap would notify the user the minute it appears in the user messages section
27
The Battle: Some Observations ● Extras ● Ethereal ● Thouough information of packets. ● Broad support for most protocols. ● Filtering features to help organize packets. ● Can read capture logs from over 20 prograns. ● Ettercap ● Real time information delivered while sniffing. ● A sniffer with weaponry. ● Custom plugin support.
28
The Verdict ● Ethereal ● Best suited for packet analyzation. ● Ettercap ● Best suited to test security of a network. – Supplies the user with a variety of tools. ● Plugins ● Bridged Sniffing ● Attacks ● Not just a sniffer.
29
Ettercap: Pros and Cons ● Pros – Very, very powerful tool. – Easy to use GUI interface. – Real Time Information while sniffing. – Ability to perform attacks easily. ● Cons – Can be difficult to compile for Windows. – Curses GUI not too stable. Overlaps tables. – More documentation could be useful.
30
The Conclusion ● ”With the dust settling in the battle of the sniffers, the new Ettercap proved to be a worthy foe against Ethereal possessing immense manipulating power which can change a network’s environment. However, it still needs time to develop itself into a robust, dependable and a mature tool like Ethereal. ” – Kaleem Maxwell
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.