DOC PREVIEW
USC CSCI 530 - sniffing_sp07

This preview shows page 1-2 out of 7 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CSCI 530 LabScenariosSolution – Packet SnifferPacket Sniffer LimitationsExamples of Packet SniffersDefending against SniffersLab AssignmentCSCI 530 LabPacket SniffingScenariosYou are a network administrator. You suspect that some of the employees are not working and instead spending all their time at www.espn.comCould filter at the firewall for this addressBut you want to see what sites they are accessing, without their knowledgeYou are a hacker. You have compromised a system. You are unable to gain access to other systems on the network. You want to get some usernames and passwords to access these systems.Solution – Packet SnifferPacket SnifferA tool that captures, interprets, and stores network packets for analysisWorks at the Transport layer of the OSI 7 layer model (Layer 4), but some can work at Network Layer (Layer 3)Normal network traffic is based on the destination IP addressYour network card will throw away any packets that are not intended for that cardIn “Promiscuous Mode”, your network card will take all the packets on the network, regardless of the destination IP address.Packet Sniffer LimitationsSniffers are limited by the network topologyCannot extend beyond normal network boundariesCannot look past a router, switch, hub, etc.However, if you put a packet sniffer on a network backbone, then you will be able to see traffic bound between intranetsExamples of Packet SniffersEthernet SniffersWireshark (formally known as Ethereal)You will be using this tool in the labDSniffTCPDumpWireless SniffersAiropeekBluetooth SniffersBlueSweepBlueScannerDefending against SniffersChange your network topologyPart of your lab research – find out which topology and/or device is most protective against sniffersEncryptionSSHIPSecDetect sniffersAntisniff – from the l0pht groupSnortNormally for intrusion detection, but will also attempt to detect a host working in promiscuous modeLab AssignmentHandout has been postedDEN Students:This lab can be done on a home machine (I advice against doing it at work). The DEN lab will be set up next week. You will receive an e-mail with your login by next week.Lab is due by 2/12, 11:59:59 PM for all studentsAll labs must be submitted as either a .doc, .pdf, or .txt


View Full Document

USC CSCI 530 - sniffing_sp07

Download sniffing_sp07
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view sniffing_sp07 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view sniffing_sp07 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?