Sniffers - SCF Faculty Site Homepage

advertisement
8.1 Sniffers, identify types of sniffing, and understand active and passive sniffing
Exam Focus: Sniffers, identify types of sniffing, and understand active and passive sniffing.
Objective includes:




Understand lawful intercept and wiretapping
Understand sniffing and protocols vulnerable to it.
Identify types of sniffing.
Understand active and passive sniffing.
Lawful intercept
As authorized by judicial or administrative order, lawful intercept allows a Law Enforcement
Agency (LEA) to perform electronic surveillance on a target. Wiretaps on the traditional
telecommunications and Internet services in voice, data, and multiservice networks are used to
perform the surveillance. The LEA provides a request for a wiretap to the target's service
provider. The target's service provider intercepts data communication to and from the individual.
The service provider determines the edge router that handles the target's traffic by using the
target's IP address or session. The service provider then intercepts the target's traffic as it passes
via the router and forwards a copy of the intercepted traffic to the LEA without the target's
knowledge.
Benefits of lawful intercept
The following are the benefits of lawful intercept:






It permits multiple LEAs to run a lawful intercept on the same target without each other's
knowledge.
It hides information regarding lawful intercepts from all but the most privileged users.
It supports wiretaps in both the input and output direction.
It does not affect the subscriber's services on the router.
It supports wiretaps of the individual subscribers who share a single physical interface.
It provides two secure interfaces. One interface is for setting up the wiretap and the other
one is for sending the intercepted traffic to the LEA.
Network components used for lawful intercept
The following are network components used for lawful intercept:



Internet Access point (IAP): Provides information for the lawful intercept.
Mediation device: Manages most of the processing for the lawful intercept.
Collection function: Stores and processes the traffic that is intercepted by the service
provider.
Wiretapping
Wiretapping is the process used to monitor telephone and Internet conversations by third party.
Attackers connect a listening device to the circuit that carries information between two phones or
hosts on the Internet. The listening device may be hardware, software, or a combination of both
hardware and software. The following are the types of wiretapping:


Passive wiretapping: It is used to monitor and record the traffic.
Active wiretapping: It is used to monitor, record, and alter the traffic.
Sniffers
A sniffer is a software tool that is used to capture any network traffic. A sniffer changes the NIC
of the LAN card into promiscuous mode due to which the NIC begins to record the incoming and
outgoing data traffic across the network. A sniffer attack is a passive attack because the attacker
does not directly connect with the target host. Most of the time, this attack is used to grab logins
and passwords from network traffic. Tools such as Ethereal, Snort, Windump, EtherPeek, and
Dsniff are some good examples of sniffers. These tools provide many facilities to users, such as
graphical user interface, traffic statistics graph, and multiple sessions tracking. Sniffers work at
the Data Link layer of the OSI model. They do not stick to the same rules as applications and
services that are further up the stack. If one layer of the OSI model is hacked, communications
are compromised without the other layers being aware of the problem.
Examples of sniffers
The following are examples of sniffers:


Dsniff: Dsniff is a set of tools that are used for sniffing passwords, e-mail, and HTTP
traffic. Some of the tools of Dsniff include dsniff, arpredirect, macof, tcpkill, tcpnice,
filesnarf, and mailsnarf. Dsniff is highly effective for sniffing both switched and shared
networks. It uses the arpredirect and macof tools for switching across switched networks.
It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP,
POP, NNTP, IMAP, etc.
Ethereal: Ethereal is a network protocol analyzer that is used in the UNIX and Windows
operating systems. It can read and analyze data from various network resources such as
Ethernet, FDDI, PPP, Token-Ring, IEEE 802.11, Classical IP over ATM, and loopback

interfaces. It has many features, such as the ability to display filter languages and view
the reconstructed stream of a TCP session.
EtherPeek: EtherPeek is an Ethernet network traffic and protocol analyzer that is used to
capture and analyze network data traffic. It has the following features:
o It has Internet attack plug-ins that are used to test for various attacks such as
Land, Rip Trace, Tear Drop, Jolt, Pimp, Oversize IP, and WinNuke attacks.
o It has a Napster plug-in that pinpoints Napster traffic on the network.
o It has sound notification, which allows a user to assign sounds to important
network events.
Wireless sniffers
The following are some wireless sniffers:



Kismet: Kismet is a Linux-based 802.11 wireless network sniffer and intrusion detection
system. It can work with any wireless card that supports raw monitoring (rfmon) mode.
Kismet can sniff 802.11b, 802.11a, and 802.11g traffic. Kismet can be used for the
following tasks:
o To identify networks by passively collecting packets
o To detect standard named networks
o To detect masked networks
o To detect the presence of non-beaconing networks via data traffic
AiroPeek: AiroPeek is a Windows-based commercial wireless LAN analyzer for IEEE
802.11b. It supports all high level protocols, such as TCP/IP, NetBEUI, and IPX. It can
be used to perform the following tasks:
o Site surveys
o Security assessments
o Channel scanning
o Real time and post capture WEP decryptions
o Client troubleshooting
o WLAN monitoring
o Remote WLAN analysis
o Application layer protocol analysis
AirSnort: AirSnort is a Linux-based WLAN WEP cracking tool that recovers encryption
keys. It operates by passively monitoring transmissions. AirSnort uses Ciphertext Only
Attack to decrypt WEP keys. It captures approximately 5 to 10 million packets and
guesses the encryption password in a single second.
Types of sniffing
The following are the types of sniffing:

Passive sniffing: It implies sniffing via a hub. The traffic is sent to all ports on a hub. In
passive sniffing, no packets are sent and packets sent by others are monitored. Multiple
network probes are sent out to identify APs in passive sniffing.

Active sniffing: In active sniffing, sniffing is carried out on a switched network. Active
sniffing relies on injecting packets (ARP) into the network. This creates traffic. MAC
flooding, MAC duplicating, DHCP starvation, and ARP spoofing are active sniffing
techniques. MAC flooding is difficult to sniff. MAC duplication is easy to detect.
Working of a sniffer
A sniffer turns the NIC of a system to the promiscuous mode to listen to all data transmitted on
its segments. The sniffer decodes the information encapsulated in the data packet to constantly
read all information entering the computer via the NIC.
Sniffing threats
An attacker sniffs the network to steal the following sensitive information:








Email traffic
Web traffic
Chat sessions
FTP passwords
Router configuration
DNS traffic
Syslog traffic
Telnet passwords
Packet information within a given subnet can only be captured by a packet sniffer. Any laptop
can usually be plugged into the network and the network can be accessed. Switch ports of many
enterprises are open. The attacker can capture and analyze all the network traffic by placing a
packet sniffer on a network in promiscuous mode.
Protocols vulnerable to sniffing
The following protocols are vulnerable to sniffing:







Telnet and Rlogin
HTTP
SMTP
NNTP
POP
FTP
IMAP
Hacking the network using sniffers
The following steps are taken by an attacker for hacking the network using sniffers:
1. Connect the laptop to a switch port.
2. Run discovery tools in order to learn about the network topology.
3. Identify the victim's machine in order to target the attack.
4. Use ARP spoofing techniques to poison the victim machine. The traffic destined for the
victim's machine is redirected to the attacker.
5. Extract passwords and sensitive data from the redirected traffic.
Hardware protocol analyzer
A hardware protocol analyzer is an equipment that captures signals without changing the traffic
in a cable segment. It can be used for monitoring network usage and identifying malicious
network traffic that is generated due to hacking software installed in the network. It captures a
data packet, decodes, and analyzes its content based on specific predetermined rules.
SPAN port
The SPAN port is configured in order to receive a copy of every packet that passes via a switch.
8.2 Understand Address Resolution Protocol (ARP), and the process of ARP spoofing
Exam Focus: Understand Address Resolution Protocol (ARP), and the process of ARP spoofing.
Objective includes:



Understand Address Resolution Protocol (ARP).
Understanding the process of ARP spoofing.
Understand ARP poisoning.
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) is a network maintenance protocol of the TCP/IP protocol
suite. It is responsible for the resolution of IP addresses to media access control (MAC)
addresses of a network interface card (NIC). The ARP cache is used to maintain a correlation
between a MAC address and its corresponding IP address. ARP provides the protocol rules for
making this correlation and providing address conversion in both directions. ARP is limited to
physical network systems that support broadcast packets.
The Address Resolution Protocol uses a simple message format that contains one address
resolution request or response. The size of the ARP message depends on the upper layer and
lower layer address sizes, which are given by the type of networking protocol (usually IPv4) in
use and the type of hardware or virtual link layer that the upper layer protocol is running on. The
message header specifies these types, as well as the size of addresses of each. The message
header is completed with the operation code for request (1) and reply (2). The payload of the
packet consists of four addresses, the hardware and protocol address of the sender and receiver
hosts.
Address Resolution Protocol (ARP) spoofing
Address Resolution Protocol (ARP) spoofing is also known as ARP poisoning or ARP Poison
Routing (APR). It is a technique used to attack an Ethernet wired or wireless network. ARP
spoofing may permit an attacker to perform the following actions:



Sniff data frames on a local area network (LAN).
Modify the traffic
Stop the traffic altogether
The attack can only be used on networks that actually use ARP and do not use another method of
address resolution. Sending fake ARP messages to an Ethernet LAN is the principle of ARP
spoofing. Generally, the motive is to link the attacker's MAC address with the IP address of
another node (such as the default gateway). Any traffic that is meant for that IP address will be
mistakenly sent to the attacker instead. The attacker can forward the traffic to the actual default
gateway (passive sniffing) or modify the data before forwarding it. ARP spoofing attacks can be
run from a compromised host or from an attacker's machine that is connected directly to the
target Ethernet segment. Arpspoof (part of the DSniff suite of tools), Cain and Abel, and Ettercap
are the tools that can be used to carry out ARP poisoning attacks. DHCP Snooping Binding table
and Dynamic ARP Inspection should be used to defend against ARP poisoning.
WinArpAttacker, and Ufasoft Snif are also ARP poisoning tools. Ufasoft Snif is an automated
ARP poisoning tool. It sniffs passwords and email messages on the network. It also works on
Wi-Fi networks.
ARP spoofing attack
ARP packets can be forged in order to send data to the attacker's machine. In ARP spoofing, a
large number of forged ARP requests and reply packets are constructed to overload a switch. A
target computer's ARP cache is flooded with forged entries by attackers. This is also referred to
as poisoning. After the ARP table is flooded with spoofed ARP replies, a switch is set in
forwarding mode and attackers can sniff all the network packets.
An ARP request is broadcasted using user B's IP address and user A waits for user B to respond
with a MAC address when user A starts a session with user B in the same Layer 2 broadcast
domain. A malicious user eavesdrops on this unprotected Layer 2 broadcast domain. The
malicious user can respond to broadcast the ARP request and use user B's MAC address to reply
to user A.
Threats of ARP poisoning
An attacker can divert all communications between two machines by using fake ARP messages
to exchange traffic through his/her computer. The following are threats of ARP poisoning:





Denial of Service (DoS) attack
Data interception
VoIP call tapping
Stealing passwords
Manipulating data
ARP Watch
ARP watch can be used to monitor the ARP cache of a machine to see if there is duplication for a
system. If there is duplication or the system is in the promiscuous mode, arpwatch can trigger
alarms and lead to detection of sniffers.
8.3 Understand MAC duplicating
Exam Focus: Understand MAC duplicating. Objective includes:


MAC duplicating attack
VLAN hoping attack
MAC duplicating attack
In a MAC duplicating attack, the attacker confuses the switch and the switch begins to think that
two ports have the same MAC address. To perform a MAC duplicating attack, the attacker
changes the MAC address on the sniffer to one that is the same in another system on the local
subnet. This differs from ARP spoofing because, in ARP spoofing, the attacker confuses the host
by poisoning its ARP cache. SMAC is a MAC spoofing tool. DHCP Snooping Binding table,
Dynamic ARP Inspection, and IP Source Guard are used to defend against MAC spoofing.
Suppose, there is a legitimate user whose MAC address is A:B:C:D:E, and a switch that permits
access to the network if the MAC address is A:B:C:D:E. The attacker sniffs the network for
MAC addresses of the currently associated users and then attacks other users associated to the
same switch port by using that MAC address.
Spoofing attack threats
The following are MAC spoofing threats:


The network can be accessed by an attacker if MACs are used for network access.
Someone's identity already on the network can be overtaken by an attacker.
The following are IP spoofing threats:



Ping of death
ICMP unreachable
SYN flood

Trusted IP addresses can be spoofed
DHCP servers
DHCP servers maintain TCP/IP configuration information in a database. The TCP/IP
configuration information may include valid TCP/IP configuration parameters, valid IP
addresses, and duration of the lease provided by the server. It delivers address configuration to
DHCP-enabled clients in the form of a lease offer. DHCPDISCOVER, DHCPOFFER,
DHCPREQUEST, DHCPACK, DHCPNAK, DHCPDECLINE, DHCPRELEASE, and
DHCPINFORM are DHCP request/ reply messages.
An attacker broadcasts a discovery request for the entire DHCP and attempts to lease all the
DHCP addresses present in the DHCP scope.
A rogue DHCP server is set by attackers in the network. It provides DHCP addresses to the user.
An attacker can send incorrect TCP/IP settings by running a rogue DHCP server. The following
are the potential problems with incorrect information:



Wrong Default Gateway: Attacker is the gateway.
Wrong DNS server: Attacker is DNS server.
Wrong IP address: Denial of service with incorrect IP.
Gobbler
Gobbler is a DHCP starvation attack tool. Port security should be enabled to defend against
DHCP starvation attack. DHCP snooping should be enabled to defend against DHCP rogue
server attack.
VLAN hoping attack
VLAN hopping (Virtual LAN Hopping) is a computer security exploit, which is a method of
attacking a network by passing traffic to a port that is generally not accessible. It is a method of
attacking networked resources on a VLAN. VLAN hopping attacks are generally performed in
the Dynamic Trunking Protocol (DTP) and the encapsulation protocol (802.1q or ISL). There are
two primary methods of VLAN hopping:
1. Switch spoofing: In a switch spoofing attack, the attacker attempts to place a network
switch for auto-trunking and emulates either ISL or 802.1q signaling together with the
Dynamic Trunk Protocol (DTP) signaling. If the attacker becomes successful, he can see
the traffic for all VLANs.
2. Double tagging: In a double tagging attack, the attacker tries to send two VLAN tags
with the transmitted data, one tag for the victim switch and the other for the attacking
switch. The victim switch accepts the data frames as the incoming data, and then the
target switch forwards these data frames to the destination based on the VLAN identifier
in the second 802.1q header.
Protection from MAC duplication and VLAN hoping
There are various methods to protect again these attacks. Some of these methods are applicable
to both the non-switched and switched environments.



IP filtering: By enabling IP filtering on the switch, a network administrator directly
specifies which traffic is allowed to flow to and from each port.
Port security: By enabling port security, a network administrator can avoid the MAC
flood and MAC spoofing attacks.
Routing security: Routing should only be performed by the designated routers.
Role of port security in MAC attacks
Port security is required to limit MAC flooding. It locks down ports and sends an SNMP trap. It
restricts the MAC addresses that can connect through a particular port of the switch. This feature
permits a specific MAC address or a range of MAC addresses to be specified for a particular
port.
8.4 Learn ethereal capture and display filters
Exam Focus: Learn ethereal capture and display filters. Objective includes:



Ethereal
Wireshark
Wireshark filters
Ethereal
Ethereal is a network protocol analyzer that is used in the UNIX and Windows operating
systems. It can read and analyze data from various network resources such as Ethernet, FDDI,
PPP, Token-Ring, IEEE 802.11, Classical IP over ATM, and loopback interfaces. It has many
features, such as the ability to display filter languages and view the reconstructed stream of a
TCP session.
Wireshark
Wireshark is a free packet sniffer computer application. It is used for the following purposes:




Network troubleshooting
Network analysis
Software and communications protocol development
Education
Although wireshark is very similar to tcpdump, it has a graphical front-end, and more
information sorting and filtering options. By putting the network interface into promiscuous
mode, wireshark permits a user to view all traffic being passed over the network. Wireshark
captures packets using pcap to only capture the packets on the networks supported by pcap. It
has the following features:






Capturing data "from the wire" from a live network connection or reading from a file that
records the already-captured packets
Reading live data that can be read from a number of types of network, including Ethernet,
IEEE 802.11, PPP, and loopback
Browsing captured network data through a GUI, or through the terminal (command-line)
version of the utility, tshark
Programmatically editing captured files or converting captured files through commandline switches to the "editcap" program
Refining data display using a display filter
Creating plugins for dissecting new protocols
Wireshark filters
The following are Wireshark filters:





tcp.flags.reset=1: It displays all TCP resets.
http.request: It displays all HTTP GET requests.
tcp contains traffic: It displays all packets that include the word 'traffic'.
udp contains 33.27.58: It sets a filter for the HEX values of 0x33 0x27 0x58 at any
offset.
tcp.analysis.retransmission: It displays all retransmissions in the trace.
Few important filters of ethereal
The following are the important filters of ethereal:







ip.dst eq www.eccouncil.org: This command sets the filter to capture only packets
destined for the web server http://www.eccouncil.org/.
ip.src == 192.168.1.1: This command sets the filter to capture only packets coming from
the host 192.168.1.1.
eth.dst eq ff:ff:ff:ff:ff:ff: This command sets the filter to capture only Layer 2 broadcast
packets.
host 172.18.5.4: This sets the filter to capture only traffic to or from IP address
172.18.5.4.
net 192.168.0.0/24: This command sets the filter to capture traffic to or from a range of
IP addresses.
port 80: This command sets the filter to capture traffic to destination port 80 (HTTP).
port 80 and tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x47455420: This command sets the
filter to capture HTTP GET requests. The filter looks for the bytes "G", "E", "T", and " "
(hex values 47, 45, 54, and 20) just after the TCP header. "tcp[12:1] & 0xf0) >> 2"
figures out the TCP header length.
8.5 Understand MAC flooding, understand DNS spoofing techniques, and DNS spoofing
countermeasures
Exam Focus: Understand MAC flooding, understand DNS spoofing techniques, DNS spoofing
countermeasures. Objective includes:



Understand MAC flooding.
Understand DNS spoofing techniques.
Identify sniffing countermeasures.
MAC flooding
MAC flooding is a technique employed to compromise the security of network switches. In a
typical MAC flooding attack, a switch is flooded with packets, each containing different source
MAC addresses. The intention is to consume the limited memory set aside in the switch to store
the MAC address-to-physical port translation table. The result of this attack causes the switch to
enter a state called failopen mode, in which all incoming packets are broadcast out on all ports
(as with a hub), instead of just down the correct port as per normal operation. A malicious user
could then use a packet sniffer (such as Wireshark) running in promiscuous mode to capture
sensitive data from other computers (such as unencrypted passwords, e-mail and instant
messaging conversations), which would not be accessible were the switch operating normally.
Yersinia is a MAC flooding tool.
MAC address/ CAM table
All Content Addressable Memory (CAM) tables hold a fixed size. It includes information such
as MAC address that is available on physical ports with their associated VLAN parameters.
Working of CAM:
An additional ARP request will flood every port on a switch once the CAM table on the switch is
full. This will basically turn the switch into a hub. The CAM tables of adjacent switches will also
be filled by this attack.
Macof
Macof is a tool of the dsniff tool set, and it is used to flood the local network with random MAC
addresses. It causes some switches to fail open in repeating mode, and facilitates sniffing. It
generates random MAC addresses exhausting the switch's memory and is capable of generating
155,000 MAC entries on a switch per minute. Due to this effect, most of the switches revert to
act like a hub.
Cache poisoning
Cache poisoning is also known as DNS cache poisoning. When a DNS server cannot answer the
query within its cache, the DNS server forwards the query to another DNS server on behalf of
the client. If the query passed to the other DNS server holds incorrect information, then cache
poisoning can occur. Malicious cache poisoning is also known as DNS spoofing.
DNS spoofing
DNS spoofing is a MITM attack that is used to supply false DNS information to the users when
they attempt to browse. For example, if there is a website www.bankofamerica.com residing at
the IP address XXX.XX.XX.XX, the users of the website can be sent to a fake
www.bankofamerica.com residing at IP address YYY.YY.YY.YY, which an attacker has created
in order to steal online banking credentials.
DNS poisoning
DNS poisoning tricks a DNS server and makes it believe that it has received authentic
information, but in reality it has not. DNS poisoning leads to substitution of a false Internet
provider address at the domain name service level. At the domain name service level, web
addresses are converted into numeric Internet provider address. The following are DNS
poisoning techniques:



Intranet DNS spoofing: A user must be connected to the local area network (LAN) and
be able to sniff packets for Intranet DNS spoofing. Intranet DNS spoofing operates well
against switches with ARP poisoning.
Internet DNS poisoning: In Internet DNS poisoning, an attacker infects a machine of a
user with a Trojan and changes the user's DNS IP address with that of the attacker.
DNS cache poisoning: In DNS cache poisoning, records are changed or added in the
resolver cache of a DNS. An IP address of a fake website established by an attacker is
returned by a DNS query for a domain. The server will cache the incorrect entries locally

and serve them to users making the same request if the server cannot validate that DNS
responses have arrived from an authoritative resource.
Proxy Server DNS poisoning: Attackers send a Trojan to a user's machine that changes
the user's proxy server settings in Internet Explorer to that of the attackers.
Defend against DNS poisoning
The following actions are taken to defend against DNS poisoning:







All DNS queries should be resolved to a local DNS server.
DNS requests should be blocked from going to external servers.
DNSSEC should be implemented.
A DNS resolver should be configured to use a new random source port from its available
range for each outgoing query.
The firewall should be configured to restrict external DNS lookup.
DNS recursing service, either full or partial, to authorized users should be restricted.
DNS Non-Existent Domain (NXDOMAIN) Rate Limiting should be used.
Sniffing prevention techniques
The following are sniffing prevention techniques:






Using PGM and S/MIME
Using Virtual Private Networks (VPNs)
Using Secure Shell (SSH)
Using IP Security (IPSec)
Using One-time passwords (OTP)
Using SSL/TLS protocol
Defend against sniffing
The following actions are taken to defend against sniffing:







The physical access to the network media should be restricted so that it can be ensured
that a packet sniffer cannot be installed.
Encryption should be used so that confidential information can be protected.
The MAC address of the gateway should be permanently added to the ARP cache.
Static IP addresses and static ARP tables should be used so that attackers can be
prevented from adding the spoofed ARP entries for machines in the network.
Network identification broadcasts should be turned off and the network should be
protected from being discovered with sniffing tools if it is possible to restrict the network
to authorized users.
IPv6 protocol should be used instead of IPv4.
Encrypted sessions (SSH instead of Telent, Secure Copy (SCP) instead of FTP, and SSL
for email connection) should be used for protecting wireless network users against
sniffing attacks.
Countermeasures against DNS spoofing
Due to the attacks being mostly passive by nature, DNS spoofing is difficult to defend. However,
the following steps can be taken as countermeasures against the DNS spoofing attacks:




Secure internal machines - Since DNS spoofing is performed via network, if the internal
network devices are secure, then there are very few chances of internal servers to be
compromised.
Don't rely on DNS for secure systems.
Use IDS - A network administrator should install an intrusion detection system to give
alarms on ARP cache poisoning and DNS spoofing.
Use DNSSEC to secure DNS records.
8.6 Know various sniffing tools, identify sniffing detection and defensive techniques
Exam Focus: Know various sniffing tools, and identify sniffing detection and defensive
techniques. Objective includes:


Know various sniffing tools.
Identify sniffing detection and defensive techniques.
Sniffing tools
The following are sniffing tools:





















EtherDetect Packet Sniffer
Ettercap
dsniff
Windump
CACE Pilot
EffeTech HTTP Sniffer
SmartSniff
Ntop
EtherApe
Network Probe
Maa Tec Network Monitor
Snort
Alchemy Network Monitor
Colasoft MSN Monitor
CommView
Sniff'em
NetResident
Kismet
IE HTTP Analyzer
AIM Sniffer
MiniStumbler












Netstumbler
PacketMon
Packet Sniffer
EtherScan Analyzer
NaDetector
PRTG Network Monitor
Microsoft Network Monitor
Sniff-O-Matic
NetworkMiner
Network Security Toolkit
Jitbit Network Sniffer
Atelier Web Ports Traffic Analyzer (AWPTA)
The following are some important sniffing tools:






Tcpdump: It is a powerful command line interface packet sniffer. It runs on Linux and
Windows.
Ace: It is a password sniffing tool. Ace Password Sniffer can be used to monitor and
capture passwords via FTP, POP3, HTTP, SMTP, Telnet, and webmail passwords.
Capsa Network Analyzer: It is a packet sniffing tool. It is used to capture all data
transmitted over the network. It delivers a wide range of analysis statistics in an intuitive
and graphical manner.
OmniPeek sniffer: It displays a Google Map in the OmniPeek capture window. In the
Google Map, OmniPeek sniffer shows the location of all the public IP addresses of
captured packets. OmniPeek sniffer is a great way used to monitor the network in real
time. It is used to show locations in the world from where the traffic is coming.
Observer: It delivers a comprehensive drill-down into network traffic. It provides backin-time analysis, reporting, trending, alarms, application tools, and route monitoring
capabilities.
Big-Mother: It is an eavesdropping program. It captures and analyzes communication
traffic over a home network by using a switch sniffer. It has the following features:
o It logs in real time URL visits, email, chats, games, FTP, and data flows.
o It takes webpage snapshots, duplicates email and FTP copies, records MSN
messenger content, and gives statistical reports.
EtherApe
EtherApe is a packet sniffer/network traffic monitoring tool, developed for Unix. Network traffic
is displayed using a graphical interface. Each node represents a specific host. Links represent
connections to hosts. Nodes and links are color coded to represent different protocols forming
the various types of traffic on the network. Individual nodes and their connecting links grow and
shrink in size with increase and decrease in network traffic. EtherApe supports Ethernet, FDDI,
Token Ring, ISDN, PPP and SLIP devices.
Dsniff
Dsniff is a set of tools used for sniffing passwords, e-mail, and HTTP traffic. Dsniff tools include
the following:







dsniff
arpredirect
macof
tcpkill
tcpnice
filesnarf
mailsnarf
Dsniff is highly effective for sniffing both switched and shared networks. It uses the arpredirect
and macof tools to switch across switched networks. It can also be used to capture authentication
information for the following:







FTP
Telnet
SMTP
HTTP
POP
NNTP
IMAP
EtherPeek
EtherPeek is an Ethernet network traffic and protocol analyzer that is used to capture and analyze
network data traffic. It has the following features:



It has Internet attack plug-ins that are used to test for various attacks such as Land, Rip
Trace, Tear Drop, Jolt, Pimp, Oversize IP, and WinNuke attacks.
It has a Napster plug-in that pinpoints Napster traffic on the network.
It includes a sound notification, which allows a user to assign sounds to important
network events.
Mailsnarf
Mailsnarf is a tool that captures and outputs SMTP mail traffic sniffed on the network. Once the
attacker gets access to the target subnet, he can use mailsnarf to capture mail traffic that passes
through the network subnet or Ethernet switch. Mailsnarf reassembles and displays e-mail traffic
in a proper format; hence, the attacker can easily read other users' e-mail.
Webspy
Webspy is a tool that allows the network administrator to see all the Web pages visited by an
attacker. For example, let the IP address of the attacker be 222.222.222.222, running the Webspy
222.222.222.222 command intercepts all HTTP traffic to and from the IP addresses
222.222.222.222 and passes it off to a local browser. However, Webspy does not follow targets
over SSL connection. Besides this, it does not reveal information entered into form fields (like
passwords).
Form Scalpel
Form Scalpel is a hacking tool that is used to assess the resilience of Web sites to various forms
of attacks. It supports HTTP/HTTPS, Proxy servers, Cookies, Java/javascript/vbscript/XML
pages and forms. It also provides detailed analysis of certificates as well as real-time
manipulation of HTML data.
Hping
Hping is a free packet generator and analyzer for the TCP/IP protocol. Hping is one of the de
facto tools for security auditing and testing of firewalls and networks. The new version of hping,
hping3, is scriptable using the Tcl language and implements an engine for string based, human
readable description of TCP/IP packets, so that the programmer can write scripts related to low
level TCP/IP packet manipulation and analysis in very short time. Like most tools used in
computer security, hping is useful to both system administrators and crackers (or script kiddies).
Discovery tools
The following are discovery tools:


NetworkView: It is a network and discovery management tool for Windows. It uses
DNS, SNMP, ports, NetBIOS, and WMI to discover TCP/IP notes and routes.
Dude sniffer: It scans all devices within the specified subnets and draws a detailed layout
map.
Sniffers detection techniques
The following are sniffers detection techniques:




Ping method: In this method, a ping request is sent with the IP address of the suspect
machine but not its MAC address. Hence, this packet should not be used, as each
Ethernet Adapter will reject it as it does not match its MAC address. However, if the
system is in the promiscuous mode, it will respond as it does not bother rejecting packets
with a different Destination MAC address.
ARP2 method: This method is based on the concept that a system in the promiscuous
mode will be in the promiscuous mode and it will cache ARP address. In the next step,
we send a broadcast ping packet with our IP, but a different MAC address. Only a system
in promiscuous mode will have the correct MAC address from the sniffed ARP frame.
So, the system in promiscuous mode will be able to respond to the broadcasted ping
request.
Latency method: This method is on the assumption that most sniffers do some parsing.
If the system is in promiscuous mode, it will parse the data. This will increase the load on
it and it will take extra time to respond to the ping packet.
ARP Watch: It can be used to monitor the ARP cache of a machine to see if there is
duplication for a system. If there is duplication or the system is in the promiscuous mode,
arpwatch can trigger alarms and lead to detection of sniffers.



Promiscuous mode: It permits a network device to intercept and read every packet that
enters in its entirety. Machines that are running in the promiscuous mode are checked.
PromqryUI and PromiScan are promiscuous detection tools. It is a security tool from
Microsoft. It detects network interfaces running in promiscuous mode.
IDS: It can be used to alert administrators regarding suspicious activities. It is run and
checked if the MAC address of specific machines has changed.
Network tools: Network tools such as HP Performance Insight can be run in order to
monitor the network for strange packets. Network tools are useful to collect, consolidate,
centralize, and analyze traffic data across different network resources and technology.
Countermeasures against sniffer attacks
It is quite difficult to overcome sniffer attacks. However, the following steps can be taken as
countermeasures against such attacks:





Use encrypted protocols for all communication.
Segment the network to limit the spread of information.
Use switches instead of hubs since they switch communications, which means that
information is delivered only to the predefined host.
Use a sniffer detector that checks whether an NIC is in promiscuous mode or not.
For wireless networks, reduce the range of the network so that it can cover only the
necessary surface area.
MAC flooding
MAC flooding is a technique employed to compromise the security of network switches.
Chapter Summary
In this chapter, we learned about sniffers, types of sniffers, ARP spoofing, MAC duplicating, and
ethereal capture and display filters. In this chapter, we discussed MAC flooding, DNS spoofing
techniques, and DNS spoofing countermeasures. This chapter focused on various sniffing tools
and sniffing detection and defensive techniques.
Glossary
ARP watch
ARP watch can be used to monitor the ARP cache of a machine to see if there is duplication for a
system.
DNS poisoning
DNS poisoning tricks a DNS server into believing that it has received authentic information, but
in reality it has not.
DNS spoofing
DNS spoofing is a MITM attack that is used to supply false DNS information to the users when
they attempt to browse.
Dsniff
Dsniff is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic.
Ethereal
Ethereal is a network protocol analyzer that is used in the UNIX and Windows operating
systems.
Macof
Macof is a tool of the dsniff tool set and it is used to flood the local network with random MAC
addresses.
Sniffer
A sniffer is a software tool that is used to capture any network traffic. The sniffer changes the
NIC of the LAN card into promiscuous mode due to which the NIC begins to record the
incoming and outgoing data traffic across the network.
VLAN hopping
VLAN hopping (Virtual LAN Hopping) is a computer security exploit, which is a method of
attacking a network by passing traffic to a port that is generally not accessible.
Wireshark
Wireshark is a free packet sniffer computer application. It is used for network troubleshooting,
analysis, software and communications protocol development, and education.
Download