CEH Lesson 4 - Snipping, Session Hijacking, and DoS
CEH Lesson 4 - Snipping, Session Hijacking, and DoS
Lesson 4
Sniffers, Session Hijacking, and
Denial-of-Service
Lesson 5
Objectives
Wireshark
– Displays multiple views of captured data:
• Summary
• Details
• Hex
– Filters can be set up to view specific types of traffic:
• Capture filters
• Display filters
CACE Pilot
Omnipeek
Dsniff
TCPdump
Windump
Wireshark
Sniffers, such as Wireshark, can display multiple views of captured traffic. Three
main views are available:
– Summary
– Detail
– Hex
Number Conversion
Wireshark Filters
An important feature of a sniffer such as Wireshark is the capability it has to set up
filters to view specific types of traffic. Filters can be defined in one of two ways:
– Capture filters: Used when you know in advance what you are looking for.
They allow you to predefine the type of traffic captured. For example, you
could set a capture filter to capture only HTTP traffic.
– Display filters: Used after the traffic is captured. Although you might have
captured all types of traffic, you could apply a display filter to show only ARP
packets. Display filter examples include the following:
– Filter by IP address (for example, ip.addr==192.168.123.1)
– Filter by multiple IP addresses (for example, ip.addr==192.168.123.1 or
ip.addr==192.168.123.2)
– Filter by protocol such as ARP, ICMP, HTTP, or BGP
– Filter by port (for example, tcp.port==23)
– Filter by activity (for example, tcp.flags.reset==1)
Countermeasures
Ettercap
Hunt
TTY Watcher
IP Watcher
T-Sight
Application layer session hijacking
– Firesheep
– Hamster
– Session thief
– Temper IE
Preventing Session Hijacking