+ All Categories
Home > Documents > 1 Ethereal. Freeware sniffing tool. Captures live network traffic. The user interface separates...

1 Ethereal. Freeware sniffing tool. Captures live network traffic. The user interface separates...

Date post: 11-Jan-2016
Category:
Upload: beverly-stafford
View: 217 times
Download: 0 times
Share this document with a friend
Popular Tags:
28
1 Ethereal. Freeware sniffing tool. Captures live network traffic. The user interface separates it from other sniffers.
Transcript
Page 1: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

1

Ethereal.

Freeware sniffing tool.Captures live network traffic.The user interface separates it from other sniffers.

Page 2: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

2

Download Instruction.

Need to download two components. WinPcap.

www.ethereal.com/distribution/win32/ http://winpcap.polito.it/install/default.htm

Ethereal (main program). http://www.ethereal.com/distribution/win32/

Page 3: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

3

Brief Technical Details.

Ethereal can read files of other software that is used for sniffing. (Tcpdump, Microsoft's Network Monitor etc.)

Can show 442 different protocols in a user friendly way. This means that you don’t have to know all the protocols. (you can click your way to find the TTL for example)

Page 4: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

4

First look at Ethereal.

1. Shows the packets that have been captured.

2. Shows details of a selected packet.

3. The packet’s data in HEX.

Page 5: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

5

Starting with Ethereal.

Page 6: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

6

The second window.

Page 7: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

7

Using options while capturing. 1. Captures first 68 bytes of the

packet by default. This can be changed to allow variation.

2. This allows you to capture all the packets in the wire. If it is not set then Ethereal will only capture packet going from or to this machine. If the option is set off and interface is in promiscuous you will still catch the network traffic.

3. Allows to save the captured data in a specified file. The file name is entered in the space indicated by 15.

4. Rotates Captured file by the amount time specified in the space marked 17.

Page 8: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

8

Using options while capturing.5. This specifies that the packets

captured should be in the first window as soon as they are picked up.

6. Scroll down the first window to keep up with the latest packet.

7. Specifies the number of packet the user wants to capture in the space marked 18.

8. Specifies the kilobytes(s) the user wants to capture in the space marked 19.

9. Specifies the time for which the user wants to capture in the space marked 20.

Page 9: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

9

Using options while capturing.10. Translates the MAC address to

specify the name of the manufacturer.

11. Specifies the IP address into domain names.

12. Translates the port into protocol names.

13. Specify the name of the interface that you want to capture packets. Usually there is only one name except for multi-homed machine.

14. The user can write down the preference here in this space while capturing packets

Page 10: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

10

FILTERING COMMAND.

Allows the user to enter specific command on what packets to capture.

Page 11: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

11

[src|dst] host <host> Specifies the host

whose packets to capture.

Example:host 192.168.2.100:

Page 12: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

12

[src|dst] port <port> This allows

ethereal to capture packet from or to the port specified.

Example port 139

Page 13: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

13

[src|dst] net <net> [{mask <mask>}|{len <len>}]

This allows you to filter on network numbers.In addition, you can specify either the netmask or the CIDR prefix for the network if they are different from your own.

Example :net 192.168.2.0

mask 255.255.255

Page 14: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

14

less|greater <length> This allows you to filter on

packets whose length was less than or equal to the specified length, or greater than or equal to the specified length, respectively.

Example: greater 40

Page 15: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

15

ether|ip broadcast|multicast This allows you to filter on

either Ethernet or IP broadcasts or multicasts.

Example: ip broadcast.

Page 16: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

16

ip|ether proto <protocol> This primitive allows you

to filter on the specified protocol at either the Ethernet layer or the IP layer.

Example:ip proto ICMP

Page 17: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

17

Ethereal features.

Ethereal has lots of cool features to aid the user in analyzing the packets captured.

Filters after capturing. Visual effects.

Page 18: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

18

Filtering after capture.Ethereal has option of filtering the captured data. This is specially useful since the amount of data captured is large. There are a large number of filters most of them can be figured out by clicking the Add Expression button.For example sake I have shown few of the filter in the next few slides.

Page 19: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

19

Filters. Ip.addr == <IP Address>

Shows only the packets from or to the IP Address specified. Example: Ip.addr == 192.168.2.102

Page 20: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

20

Filters. Frame.pkt._len > <size>

Shows packets greater than the size specified. This can be used

with as also less than (<).

Example: Frame.pkt._len > 70

Page 21: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

21

Filters. Tcp.flags.<name>

Shows packets the flag bit set. EXAMPLE : Tcp.flags.ack

Page 22: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

22

Filters. You can make a complex filter by adding

AND, OR, XOR, NOT. Example: ip.addr == 192.168.2.102 and tcp.flags.ack

There are some other operators called substring operators. There functions are:

[x:y] specifies the range.

[x:] specifies the range starting from x to the end of the sequence.

[x,y,z] specifies compound range.Example:eth.src[0:3,1-2,:4,4:,2] == 00:00:83:00:83:00:00:83:00:20:20:83

Page 23: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

23

Visual effects.You can specific filters to colour the type of packets you are interested. To do this you have to click view-

>coloring rules.

Page 24: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

24

Visual effects.For example I have chosen the packets with ack bit set. I want them to noticeable. Then all I do is.

View-> coloring rules -> new -> add expression. After adding the expression. Press OK. Set the colours (I have set it to green). Then the result would look like something like this.

Page 25: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

25

Visual effects. (The results)

Page 26: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

26

Following TCP streams.

If you want to see the data on a TCP session without you trying to figure them out. You can start by clicking analyze->follow tcp stream

Page 27: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

27

SUMMARY I have learnt the basic use of

ethereal. All the test here was in a private

network. So nothing very interesting. One should understand this only a

tool not a means. One needs vast knowledge and

dedication for the proper use of this kind of tools.

Page 28: 1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.

28

Questions

Kazi Nasim Faisal1st march 2004


Recommended