module 5 sniffers

64
MODULE 4 MODULE 4 SNIFFERS SNIFFERS

Upload: leminhvuong

Post on 07-May-2015

4.912 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Module 5  Sniffers

MODULE 4MODULE 4

SNIFFERSSNIFFERS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 254

ObjectiveObjective Sniffing Protocols vulnerable to sniffing Types of sniffing ARP and ARP spoofing attack Tools for ARP spoofing MAC flooding Tools for MAC flooding Sniffing tools Types of DNS poisoning Raw sniffing tools Detecting sniffing Countermeasures

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 354

Definition SniffingDefinition Sniffing A program or device that

captures vital information from the network traffic specific to a particular network

Sniffing is a data interception technology

The objective of sniffing is to steal Passwords (from email the

web SMB ftp SQL or telnet)

Email text Files in transfer (email files

ftp files or SMB)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 454

Protocols Vulnerable to SniffingProtocols Vulnerable to Sniffing Protocols that are susceptible to sniffers

include Telnet and Rlogin Keystrokes including user

names and passwords HTTP Data sent in clear text SMTP Passwords and data sent in clear text NNTP Passwords and data sent in clear text POP Passwords and data sent in clear text FTP Passwords and data sent in clear text IMAP Passwords and data sent in clear text

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 554

Tool Network View ndash Scans the Network

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 654

The Dude SnifferThe Dude Sniffer Developed by Mikro Tik the Dude network

monitor is a new application which can improve the way you manage your network environment

Functions Automatically scans all devices within specified

subnets Draws and lays out a map of your networks Monitors services of your devices Alerts you in case some service has problems

It is written in two parts Dude Server which runs in a background Dude Client which may connect to local or

remote dude server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 754

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 854

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 954

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1054

EtherealEthereal

Ethereal is a network protocol analyzer for UNIX and Windows

It allows the user to examine data from a live network or from a capture file on a disk

The user can interactively browse the captured data viewing summary and detailed information for each packet captured

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1154

Display Filters in EtherealDisplay Filters in Ethereal Display filters are used to change

the view of packets in captured files

Display Filtering by Protocol Example type the protocol in the

filter box arp http tcp udp dns

Filtering by IP Address ipaddr == 10004

Filtering by multiple IP Addresses ipaddr == 10004 or ipaddr

==10005 Monitoring Specific Ports

tcpport==443 ipaddr==1921681100 machine ipaddr==1921681100 ampamp

tcpport=443 Other Filters

ipdst == 100150 ampamp framepkt_len gt 400

ipaddr == 100112 ampamp icmp ampamp framenumber gt 15 ampamp framenumber lt 30

ipsrc==2051536330 or ipdst==2051536330

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1254

Following the TCP Stream in EtherealFollowing the TCP Stream in Ethereal

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 2: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 254

ObjectiveObjective Sniffing Protocols vulnerable to sniffing Types of sniffing ARP and ARP spoofing attack Tools for ARP spoofing MAC flooding Tools for MAC flooding Sniffing tools Types of DNS poisoning Raw sniffing tools Detecting sniffing Countermeasures

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 354

Definition SniffingDefinition Sniffing A program or device that

captures vital information from the network traffic specific to a particular network

Sniffing is a data interception technology

The objective of sniffing is to steal Passwords (from email the

web SMB ftp SQL or telnet)

Email text Files in transfer (email files

ftp files or SMB)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 454

Protocols Vulnerable to SniffingProtocols Vulnerable to Sniffing Protocols that are susceptible to sniffers

include Telnet and Rlogin Keystrokes including user

names and passwords HTTP Data sent in clear text SMTP Passwords and data sent in clear text NNTP Passwords and data sent in clear text POP Passwords and data sent in clear text FTP Passwords and data sent in clear text IMAP Passwords and data sent in clear text

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 554

Tool Network View ndash Scans the Network

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 654

The Dude SnifferThe Dude Sniffer Developed by Mikro Tik the Dude network

monitor is a new application which can improve the way you manage your network environment

Functions Automatically scans all devices within specified

subnets Draws and lays out a map of your networks Monitors services of your devices Alerts you in case some service has problems

It is written in two parts Dude Server which runs in a background Dude Client which may connect to local or

remote dude server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 754

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 854

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 954

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1054

EtherealEthereal

Ethereal is a network protocol analyzer for UNIX and Windows

It allows the user to examine data from a live network or from a capture file on a disk

The user can interactively browse the captured data viewing summary and detailed information for each packet captured

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1154

Display Filters in EtherealDisplay Filters in Ethereal Display filters are used to change

the view of packets in captured files

Display Filtering by Protocol Example type the protocol in the

filter box arp http tcp udp dns

Filtering by IP Address ipaddr == 10004

Filtering by multiple IP Addresses ipaddr == 10004 or ipaddr

==10005 Monitoring Specific Ports

tcpport==443 ipaddr==1921681100 machine ipaddr==1921681100 ampamp

tcpport=443 Other Filters

ipdst == 100150 ampamp framepkt_len gt 400

ipaddr == 100112 ampamp icmp ampamp framenumber gt 15 ampamp framenumber lt 30

ipsrc==2051536330 or ipdst==2051536330

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1254

Following the TCP Stream in EtherealFollowing the TCP Stream in Ethereal

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 3: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 354

Definition SniffingDefinition Sniffing A program or device that

captures vital information from the network traffic specific to a particular network

Sniffing is a data interception technology

The objective of sniffing is to steal Passwords (from email the

web SMB ftp SQL or telnet)

Email text Files in transfer (email files

ftp files or SMB)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 454

Protocols Vulnerable to SniffingProtocols Vulnerable to Sniffing Protocols that are susceptible to sniffers

include Telnet and Rlogin Keystrokes including user

names and passwords HTTP Data sent in clear text SMTP Passwords and data sent in clear text NNTP Passwords and data sent in clear text POP Passwords and data sent in clear text FTP Passwords and data sent in clear text IMAP Passwords and data sent in clear text

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 554

Tool Network View ndash Scans the Network

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 654

The Dude SnifferThe Dude Sniffer Developed by Mikro Tik the Dude network

monitor is a new application which can improve the way you manage your network environment

Functions Automatically scans all devices within specified

subnets Draws and lays out a map of your networks Monitors services of your devices Alerts you in case some service has problems

It is written in two parts Dude Server which runs in a background Dude Client which may connect to local or

remote dude server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 754

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 854

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 954

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1054

EtherealEthereal

Ethereal is a network protocol analyzer for UNIX and Windows

It allows the user to examine data from a live network or from a capture file on a disk

The user can interactively browse the captured data viewing summary and detailed information for each packet captured

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1154

Display Filters in EtherealDisplay Filters in Ethereal Display filters are used to change

the view of packets in captured files

Display Filtering by Protocol Example type the protocol in the

filter box arp http tcp udp dns

Filtering by IP Address ipaddr == 10004

Filtering by multiple IP Addresses ipaddr == 10004 or ipaddr

==10005 Monitoring Specific Ports

tcpport==443 ipaddr==1921681100 machine ipaddr==1921681100 ampamp

tcpport=443 Other Filters

ipdst == 100150 ampamp framepkt_len gt 400

ipaddr == 100112 ampamp icmp ampamp framenumber gt 15 ampamp framenumber lt 30

ipsrc==2051536330 or ipdst==2051536330

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1254

Following the TCP Stream in EtherealFollowing the TCP Stream in Ethereal

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 4: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 454

Protocols Vulnerable to SniffingProtocols Vulnerable to Sniffing Protocols that are susceptible to sniffers

include Telnet and Rlogin Keystrokes including user

names and passwords HTTP Data sent in clear text SMTP Passwords and data sent in clear text NNTP Passwords and data sent in clear text POP Passwords and data sent in clear text FTP Passwords and data sent in clear text IMAP Passwords and data sent in clear text

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 554

Tool Network View ndash Scans the Network

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 654

The Dude SnifferThe Dude Sniffer Developed by Mikro Tik the Dude network

monitor is a new application which can improve the way you manage your network environment

Functions Automatically scans all devices within specified

subnets Draws and lays out a map of your networks Monitors services of your devices Alerts you in case some service has problems

It is written in two parts Dude Server which runs in a background Dude Client which may connect to local or

remote dude server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 754

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 854

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 954

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1054

EtherealEthereal

Ethereal is a network protocol analyzer for UNIX and Windows

It allows the user to examine data from a live network or from a capture file on a disk

The user can interactively browse the captured data viewing summary and detailed information for each packet captured

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1154

Display Filters in EtherealDisplay Filters in Ethereal Display filters are used to change

the view of packets in captured files

Display Filtering by Protocol Example type the protocol in the

filter box arp http tcp udp dns

Filtering by IP Address ipaddr == 10004

Filtering by multiple IP Addresses ipaddr == 10004 or ipaddr

==10005 Monitoring Specific Ports

tcpport==443 ipaddr==1921681100 machine ipaddr==1921681100 ampamp

tcpport=443 Other Filters

ipdst == 100150 ampamp framepkt_len gt 400

ipaddr == 100112 ampamp icmp ampamp framenumber gt 15 ampamp framenumber lt 30

ipsrc==2051536330 or ipdst==2051536330

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1254

Following the TCP Stream in EtherealFollowing the TCP Stream in Ethereal

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 5: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 554

Tool Network View ndash Scans the Network

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 654

The Dude SnifferThe Dude Sniffer Developed by Mikro Tik the Dude network

monitor is a new application which can improve the way you manage your network environment

Functions Automatically scans all devices within specified

subnets Draws and lays out a map of your networks Monitors services of your devices Alerts you in case some service has problems

It is written in two parts Dude Server which runs in a background Dude Client which may connect to local or

remote dude server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 754

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 854

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 954

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1054

EtherealEthereal

Ethereal is a network protocol analyzer for UNIX and Windows

It allows the user to examine data from a live network or from a capture file on a disk

The user can interactively browse the captured data viewing summary and detailed information for each packet captured

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1154

Display Filters in EtherealDisplay Filters in Ethereal Display filters are used to change

the view of packets in captured files

Display Filtering by Protocol Example type the protocol in the

filter box arp http tcp udp dns

Filtering by IP Address ipaddr == 10004

Filtering by multiple IP Addresses ipaddr == 10004 or ipaddr

==10005 Monitoring Specific Ports

tcpport==443 ipaddr==1921681100 machine ipaddr==1921681100 ampamp

tcpport=443 Other Filters

ipdst == 100150 ampamp framepkt_len gt 400

ipaddr == 100112 ampamp icmp ampamp framenumber gt 15 ampamp framenumber lt 30

ipsrc==2051536330 or ipdst==2051536330

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1254

Following the TCP Stream in EtherealFollowing the TCP Stream in Ethereal

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 6: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 654

The Dude SnifferThe Dude Sniffer Developed by Mikro Tik the Dude network

monitor is a new application which can improve the way you manage your network environment

Functions Automatically scans all devices within specified

subnets Draws and lays out a map of your networks Monitors services of your devices Alerts you in case some service has problems

It is written in two parts Dude Server which runs in a background Dude Client which may connect to local or

remote dude server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 754

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 854

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 954

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1054

EtherealEthereal

Ethereal is a network protocol analyzer for UNIX and Windows

It allows the user to examine data from a live network or from a capture file on a disk

The user can interactively browse the captured data viewing summary and detailed information for each packet captured

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1154

Display Filters in EtherealDisplay Filters in Ethereal Display filters are used to change

the view of packets in captured files

Display Filtering by Protocol Example type the protocol in the

filter box arp http tcp udp dns

Filtering by IP Address ipaddr == 10004

Filtering by multiple IP Addresses ipaddr == 10004 or ipaddr

==10005 Monitoring Specific Ports

tcpport==443 ipaddr==1921681100 machine ipaddr==1921681100 ampamp

tcpport=443 Other Filters

ipdst == 100150 ampamp framepkt_len gt 400

ipaddr == 100112 ampamp icmp ampamp framenumber gt 15 ampamp framenumber lt 30

ipsrc==2051536330 or ipdst==2051536330

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1254

Following the TCP Stream in EtherealFollowing the TCP Stream in Ethereal

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 7: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 754

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 854

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 954

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1054

EtherealEthereal

Ethereal is a network protocol analyzer for UNIX and Windows

It allows the user to examine data from a live network or from a capture file on a disk

The user can interactively browse the captured data viewing summary and detailed information for each packet captured

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1154

Display Filters in EtherealDisplay Filters in Ethereal Display filters are used to change

the view of packets in captured files

Display Filtering by Protocol Example type the protocol in the

filter box arp http tcp udp dns

Filtering by IP Address ipaddr == 10004

Filtering by multiple IP Addresses ipaddr == 10004 or ipaddr

==10005 Monitoring Specific Ports

tcpport==443 ipaddr==1921681100 machine ipaddr==1921681100 ampamp

tcpport=443 Other Filters

ipdst == 100150 ampamp framepkt_len gt 400

ipaddr == 100112 ampamp icmp ampamp framenumber gt 15 ampamp framenumber lt 30

ipsrc==2051536330 or ipdst==2051536330

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1254

Following the TCP Stream in EtherealFollowing the TCP Stream in Ethereal

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 8: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 854

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 954

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1054

EtherealEthereal

Ethereal is a network protocol analyzer for UNIX and Windows

It allows the user to examine data from a live network or from a capture file on a disk

The user can interactively browse the captured data viewing summary and detailed information for each packet captured

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1154

Display Filters in EtherealDisplay Filters in Ethereal Display filters are used to change

the view of packets in captured files

Display Filtering by Protocol Example type the protocol in the

filter box arp http tcp udp dns

Filtering by IP Address ipaddr == 10004

Filtering by multiple IP Addresses ipaddr == 10004 or ipaddr

==10005 Monitoring Specific Ports

tcpport==443 ipaddr==1921681100 machine ipaddr==1921681100 ampamp

tcpport=443 Other Filters

ipdst == 100150 ampamp framepkt_len gt 400

ipaddr == 100112 ampamp icmp ampamp framenumber gt 15 ampamp framenumber lt 30

ipsrc==2051536330 or ipdst==2051536330

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1254

Following the TCP Stream in EtherealFollowing the TCP Stream in Ethereal

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 9: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 954

The Dude Sniffer - ScreenShotThe Dude Sniffer - ScreenShot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1054

EtherealEthereal

Ethereal is a network protocol analyzer for UNIX and Windows

It allows the user to examine data from a live network or from a capture file on a disk

The user can interactively browse the captured data viewing summary and detailed information for each packet captured

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1154

Display Filters in EtherealDisplay Filters in Ethereal Display filters are used to change

the view of packets in captured files

Display Filtering by Protocol Example type the protocol in the

filter box arp http tcp udp dns

Filtering by IP Address ipaddr == 10004

Filtering by multiple IP Addresses ipaddr == 10004 or ipaddr

==10005 Monitoring Specific Ports

tcpport==443 ipaddr==1921681100 machine ipaddr==1921681100 ampamp

tcpport=443 Other Filters

ipdst == 100150 ampamp framepkt_len gt 400

ipaddr == 100112 ampamp icmp ampamp framenumber gt 15 ampamp framenumber lt 30

ipsrc==2051536330 or ipdst==2051536330

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1254

Following the TCP Stream in EtherealFollowing the TCP Stream in Ethereal

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 10: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1054

EtherealEthereal

Ethereal is a network protocol analyzer for UNIX and Windows

It allows the user to examine data from a live network or from a capture file on a disk

The user can interactively browse the captured data viewing summary and detailed information for each packet captured

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1154

Display Filters in EtherealDisplay Filters in Ethereal Display filters are used to change

the view of packets in captured files

Display Filtering by Protocol Example type the protocol in the

filter box arp http tcp udp dns

Filtering by IP Address ipaddr == 10004

Filtering by multiple IP Addresses ipaddr == 10004 or ipaddr

==10005 Monitoring Specific Ports

tcpport==443 ipaddr==1921681100 machine ipaddr==1921681100 ampamp

tcpport=443 Other Filters

ipdst == 100150 ampamp framepkt_len gt 400

ipaddr == 100112 ampamp icmp ampamp framenumber gt 15 ampamp framenumber lt 30

ipsrc==2051536330 or ipdst==2051536330

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1254

Following the TCP Stream in EtherealFollowing the TCP Stream in Ethereal

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 11: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1154

Display Filters in EtherealDisplay Filters in Ethereal Display filters are used to change

the view of packets in captured files

Display Filtering by Protocol Example type the protocol in the

filter box arp http tcp udp dns

Filtering by IP Address ipaddr == 10004

Filtering by multiple IP Addresses ipaddr == 10004 or ipaddr

==10005 Monitoring Specific Ports

tcpport==443 ipaddr==1921681100 machine ipaddr==1921681100 ampamp

tcpport=443 Other Filters

ipdst == 100150 ampamp framepkt_len gt 400

ipaddr == 100112 ampamp icmp ampamp framenumber gt 15 ampamp framenumber lt 30

ipsrc==2051536330 or ipdst==2051536330

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1254

Following the TCP Stream in EtherealFollowing the TCP Stream in Ethereal

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 12: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1254

Following the TCP Stream in EtherealFollowing the TCP Stream in Ethereal

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 13: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1354

Types of SniffingTypes of Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 14: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1454

Passive SniffingPassive Sniffing

1048702 It is called passive because it is difficult to detect

1048702 ldquoPassive sniffingrdquo means sniffing through a hub

1048702 Attacker simply connects the laptop to the hub and starts sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 15: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1554

Active SniffingActive Sniffing

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 16: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1654

What is Address Resolution ProtocolWhat is Address Resolution Protocol

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 17: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1754

ARP Spoofing AttackARP Spoofing Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 18: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1854

How Does ARP Spoofing WorkHow Does ARP Spoofing Work

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 19: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 1954

ARP PoisoningARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 20: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2054

Mac DuplicatingMac Duplicating MAC duplicating attack is

launched by sniffing the network for the MAC addresses of clients that are actively associated with a switch port and re-using one of those addresses

By listening to traffic on the network a malicious user can intercept and use a legitimate users MAC address

The attacker will receive all traffic destined for that legitimate user

This technique works on Wireless Access Points with MAC filtering enabled

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 21: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2154

Mac Duplicating Attack

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 22: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2254

Tools for ARP SpoofingTools for ARP Spoofing

Tools for ARP Spoofing Hunt (Linux-based tool) Arpspoof (Linux-based tool) Ettercap (Linux and Windows)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 23: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2354

EttercapEttercap

A tool for IP-based sniffing in a switched network MAC-based sniffing OS fingerprinting ARP poisoning-based sniffing hellip

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 24: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2454

MAC FloodingMAC Flooding

MAC flooding involves flooding the switch with numerous requests

Switches have a limited memory for mapping various MAC addresses to the physical ports on the switch

MAC flooding makes use of this limitation to bombard the switch with fake MAC addresses until the switch cannot keep up

The switch then acts as a hub by broadcasting packets to all the machines on the network

After this sniffing can be easily performed

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 25: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2554

Tools for MAC FloodingTools for MAC Flooding Tools for MAC Flooding

Macof (Linux-based tool) Etherflood (Linux and Windows)

httpntsecuritynutoolboxetherflood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 26: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2654

Windows Tool EtherFloodWindows Tool EtherFlood

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 27: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2754

Threats of ARP PoisoningThreats of ARP Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 28: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2854

Tool NemesisTool Nemesis

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 29: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 2954

Sniffer Hacking Tools (dsniff package)Sniffer Hacking Tools (dsniff package)

Sniffer hacking tools (These tools are available on the Linux CD-ROM)

arpspoof Intercepts packets on a switched LAN

dnsspoof Forges replies to DNS address and pointer queries

dsniff Password sniffer

filesnarf Sniffs files from NFS traffic

mailsnarf Sniffs mail messages in Berkeley mbox format

msgsnarf Sniffs chat messages

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 30: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3054

Sniffer Hacking Tools (contrsquod)Sniffer Hacking Tools (contrsquod) sshmitm

SSH monkey-in-the-middle tcpkill

Kills TCP connections on a LAN tcpnice

Slows down TCP connections on a LAN urlsnarf

Sniffs HTTP requests in Common Log Format webspy

Displays sniffed URLs in Netscape in real time webmitm

HTTPHTTPS monkey-in-the-middle

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 31: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3154

Linux Tool DsniffLinux Tool Dsniff

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 32: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3254

Linux Tool FilesnarfLinux Tool Filesnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 33: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3354

Linux Tool MailsnarfLinux Tool Mailsnarf

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 34: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3454

DNS Poisoning TechniquesDNS Poisoning Techniques The substitution of a false Internet provider

address at the domain name service level (eg where web addresses are converted into numeric Internet provider addresses)

DNS poisoning is a technique that tricks a DNS server into believing it has received authentic information when in reality it has not

Types of DNS Poisoning1 Intranet DNS Spoofing (Local network)2 Internet DNS Spoofing (Remote network)3 Proxy Server DNS Poisoning4 DNS Cache Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 35: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3554

1Intranet DNS Spoofing (Local 1Intranet DNS Spoofing (Local Network)Network)

For this technique you must be connected to the local area network (LAN) and be able to sniff packets

Works well against switches with ARP poisoning the router

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 36: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3654

2Intranet DNS Spoofing (Remote 2Intranet DNS Spoofing (Remote Network)Network)

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 37: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3754

Internet DNS SpoofingInternet DNS Spoofing To redirect all the DNS request traffic going

from host machine to come to you 1 Set up a fake website on your computer 2 Install treewalk and modify the file mentioned in the

readmetxt to your IP address Treewalk will make you the DNS server

3 Modify the file dns-spoofingbat and replace the IP address with your IP address

4 Trojanize the dns-spoofingbat file and send it to Jessica (exchessexe)

5 When the host clicks the trojaned file it will replace Jessicarsquos DNS entry in her TCPIP properties with that of your machinersquos

6 You will become the DNS server for Jessica and her DNS requests will go through you

7 When Jessica connects to XSECURITYcom she resolves to the fake XSECURITY website you sniff the password and send her to the real website

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 38: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3854

3 Proxy Server DNS Poisoning3 Proxy Server DNS Poisoning

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 39: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 3954

4 DNS Cache Poisoning4 DNS Cache Poisoning To perform a cache poisoning attack the attacker

exploits a flaw in the DNS server software that can make it accept incorrect information

If the server does not correctly validate DNS responses to ensure that they have come from an authoritative source the server will end up caching the incorrect entries locally and serve them to users that make the same request For example an attacker poisons the IP address DNS

entries for a target website on a given DNS server replacing them with the IP address of a server he controls

He then creates fake entries for files on the server he controls with names matching those on the target server

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 40: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4054

Interactive TCP Relay

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 41: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4154

Interactive Replay AttacksInteractive Replay Attacks

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 42: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4254

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 43: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4354

HTTP Sniffer EffeTechHTTP Sniffer EffeTech

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 44: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4454

Ace Password SnifferAce Password Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 45: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4554

Ace Password SnifferAce Password Sniffer ScreenshotScreenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 46: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4654

Win Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 47: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4754

Session Capture Sniffer NWreaderSession Capture Sniffer NWreader

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 48: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4854

MSN Sniffer

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 49: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 4954

MSN Sniffer Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 50: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5054

NetSetMan ToolNetSetMan Tool NetSetMan allows you to quickly switch between pre-

configured network settings It is ideal for ethical hackers that have to connect to

different networks all the time and need to update their network settings each time

NetSetMan allows you to create 6 profiles including IP address settings Subnet Mask Default Gateway and DNS servers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 51: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5154

EtherApeEtherApe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 52: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5254

EtherApe FeaturesEtherApe Features

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 53: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5354

Network ProbeNetwork Probe

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 54: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5454

Tool WindumpTool Windump

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 55: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5554

CommViewCommView

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 56: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5654

CommView ScreenshotCommView Screenshot

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 57: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5754

How to Detect SniffingHow to Detect Sniffing

You will need to check which machines are running in promiscuous mode

Run ARPWATCH and notice if the MAC address of certain machines has changed (Example routerrsquos MAC address)

Run network tools like HP OpenView and IBM Tivoli network health check tools to monitor the network for strange packets

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 58: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5854

CountermeasuresCountermeasures Restriction of physical access to network media

ensures that apacket sniffer cannot be installed The best way to be secured against sniffing is

to use Encryption It would not prevent a sniffer from functioning but will ensure that what a sniffer reads is not important

ARP Spoofing is used to sniff a switched network so an attacker will try to ARP spoof the gateway This can be prevented by permanently adding the MAC address of the gateway to the ARP cache

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 59: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 5954

Countermeasures (contrsquod)Countermeasures (contrsquod)

Another way to prevent the network from being sniffed is to change the network to SSH

There are various methods to detect a sniffer in a network Ping method ARP method Latency method Using IDS

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 60: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6054

Countermeasures (contrsquod)Countermeasures (contrsquod)

There are various tools to detect a sniffer in a network ARP Watch Promiscan Antisniff Prodetect

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 61: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6154

Countermeasures (contrsquod)Countermeasures (contrsquod)

Small Network Use of static IP addresses and static ARP

tables which prevents hackers from adding spoofed ARP entries for machines in the network

Large Networks Network switch Port Security features should

be enabled Use of ArpWatch to monitor Ethernet activity

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 62: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6254

AntiSniff ToolAntiSniff Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 63: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6354

ArpWatch ToolArpWatch Tool

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan

Page 64: Module 5  Sniffers

Khoa CNTT ndash ĐH Nocircng Lacircm TP HCM 2008 6454

PromiScanPromiScan