Packet Analysis For Beginners Lab
Packet Analysis For Beginners Lab
Beginners
Lisa Bock, Pennsylvania College of
Technology
Topics Covered
Overview of Packet Analysis
The OSI Model
The TCP/IP Protocol Suite
Normal Network Communication - TCP and UDP
Abnormal Communication
Scanning
Malware
Overview of Packet Analysis
Packet analysis uses a packet sniffer, network monitor or analyzer, to
monitor and troubleshoot network traffic.
As data flows across the network, the sniffer captures each packet
decodes the packet's raw bits
Showing the field values in the packet according to the appropriate
RFC or other specifications.
The information can identify bottlenecks and help maintain efficient
network data transmission.
Uses for Packet Analysis
Analyze network problems
Detect network intrusion attempts and network misuse
Perform regulatory compliance through content monitoring perimeter and
endpoint traffic
Monitor bandwidth utilization
Verify endpoint security status
Gather and report network statistics
Some Common Packet Analyzers
Cain and Abel
Carnivore (FBI - monitors all of a target user's Internet traffic)
dSniff
ettercap
ngrep, Network Grep
OmniPeek
Snoop
Tcpdump
Wireshark (formerly known as Ethereal)
Packet Capture
Traffic captured is dependent on the placement of the
device.
On a switch, the packet sniffer will see only data going to
and from the switch to the capture device
Traffic seen will be unicast, broadcast, or multicast.
To see all traffic, port monitoring or SPAN on a switch is
used, or use a full duplex tap in line with traffic
http://wiki.wireshark.org/CaptureSetup/Ethernet
The OSI Model
In order to understand packet analysis you must understand the way
data is prepared for transit.
The OSI model, is a seven-layer representation of how data changes in
form as each layer provides services to the next layer
Data encapsulates or de-encapsulates
The OSI Model
PDU Address
Data
Segment Port
Packet IP
Frame
MAC
Bits
Wireshark
The tool we will use for demonstration is Wireshark, formerly Ethereal, an
open-source packet analyzer http://www.wireshark.org
Download and install Wireshark – make sure you install WinPCap
(Windows Packet Capture) if you are using Windows
For a live capture, launch Wireshark and click the name of an interface
under Capture Interfaces to start capturing packets on that interface.
Wireshark
Checkmark
the interface
you want to
capture on
In Wireshark, select any TCP frame and you will see the frame contents
from layer 2-7
Frame
Packet
Segment
Data
http://www.symantec.com/connect/articles/studying-normal-traffic-part-three-tcp-headers
UDP Example
Provides connectionless Transport Layer service to other applications
on the internet without having to go through a handshake or connection
process.
It is a simple protocol and that does not provide any ordering or data
integrity services.
UDP is an unreliable service.
Few problems occur with UDP.
What uses UDP?
Commonly used in video streaming and time-sensitive applications.
UDP Applications:
Domain Name System (DNS)
Routing Information Protocol (RIP)
Voice over IP (VoIP)
Trivial File Transfer Protocol (TFTP)
Domain Host Configuration Protocol (DHCP)
If RD is set, it directs
the name server to
pursue the query
recursively.
FTP – Grab a Pic
Purpose of FTP is to transfer files over TCP
Uses both ports 20 and 21
Command channel is designated on port 21 for the FTP server.
To transfer data like directory contents or files, a secondary channel,
port 20 is used.
Filter FTP-data traffic - then follow the TCP stream. Save as .jpg
Reassemble the Streams
Can reassemble and obtain content if data is not encrypted
Filter ftp-data traffic
Right click follow TCP stream and save the file as raw data and click
save as mystery.jpg
Go to where you saved the file and open it!
Internet Control Message Protocol
ICMP is used by routers, intermediary devices, or hosts to communicate
updates or error information to other routers, intermediary devices, or
hosts.
Used to troubleshoot network issues
Not used to exchange data between systems
ICMP is used by ping because it can generate echo-request/echo-reply
query messages.
A
Scout
for IP!
Internet Control Message Protocol
Four types of query messages that characterize the output generated by
the ping command.
Echo request/echo reply:
Used to test reachability
http://it-ebooks.info/book/3000/
DDOS
Go to http://map.ipviking.com/
http://www.symantec.com/connect/articles/network-intrusion-detection-signatures-
part-two
Port Scan
Packets 14, 15 and 16 we see an actual connection
Then it continues to attempt another connection in Packet 18, 19, 20
Enable SYN flood protection
BitTorrent uses a distributed sloppy hash table (DHT) for storing peer
contact information for "trackerless" torrents and consists of a number of
different queries and corresponding responses.
Ping G used to check if a peer is available.
Find_node G used to find the contact information for a peer.
Get_peers G requests a list of peers which have pieces of the
content.
Announce_peer G announces the contact information for the peer to
the network.