DOC PREVIEW
USC CSCI 530 - sniffing_fa06

This preview shows page 1-2-3 out of 8 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CSCI 530 LabScenariosSolution – Packet SnifferPacket Sniffer LimitationsExamples of Packet SniffersDefending against SniffersLab AssignmentLab Assignment ContinuedCSCI 530 LabPacket SniffingScenariosYou are a network administrator. You suspect that some of the employees are not working and instead spending all their time at www.espn.comCould filter at the firewall for this addressBut you want to see what sites they are accessing, without their knowledgeYou are a hacker. You have compromised a system. You are unable to gain access to other systems on the network. You want to get some usernames and passwords to access these systems.Solution – Packet SnifferPacket SnifferA tool that captures, interprets, and stores network packets for analysisWorks at the Transport layer of the OSI 7 layer model (Layer 4), but some can work at Network Layer (Layer 3)Normal network traffic is based on the destination IP addressYour network card will throw away any packets that are not intended for that cardIn “Promiscuous Mode”, your network card will take all the packets on the network, regardless of the destination IP address.Packet Sniffer LimitationsSniffers are limited by the network topologyCannot extend beyond normal network boundariesCannot look past a router, switch, hub, etc.However, if you put a packet sniffer on a network backbone, then you will be able to see traffic bound between intranetsExamples of Packet SniffersEthernet SniffersWireshark (formally known as Ethereal)You will be using this tool in the labDSniffTCPDumpWireless SniffersAiropeekBluetooth SniffersBlueSweepBlueScannerDefending against SniffersChange your network topologyPart of your lab research – find out which topology and/or device is most protective against sniffersEncryptionSSHIPSecDetect sniffersAntisniff – from the l0pht groupSnortNormally for intrusion detection, but will also attempt to detect a host working in promiscuous modeLab AssignmentHandout has been postedDEN Students:This lab can be done on a home machine (I advice against doing it at work). The DEN lab will be set up next week. You will receive an e-mail with your login by next week.Lab assignment is DUE on 9/25/06 by 11:59:59 PM FOR DEN STUDENTS ONLYAll other students, this lab is to be done during next week’s (9/18) lab section and is due before the following week’s (9/25) lab sectionLab Assignment ContinuedSubmission guidelinesE-mail the answers questions at the end of the handout by the due date. Attach as a text file, .doc, or .pdfSubmit to YOUR LAB T.A. ONLYSubject line must say:CSCI 530 Lab 3 <section day & time>Where <section day & time> are replaced with your day & timeExample:CSCI 530 Lab 3 Friday 12:30We do not send confirmation e-mails. If you request a read receipt or a return receipt, we will say yes and you will get a


View Full Document

USC CSCI 530 - sniffing_fa06

Download sniffing_fa06
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view sniffing_fa06 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view sniffing_fa06 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?