Packet Crafting
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
TCPDUMP Caution
TCPDUMP q Refer to book ”Open Source Network Administration” m Online sample chapter: http://www.phptr.com/articles/article.asp?p=170902&seqNum=4 q Some tools are not based directly on the data being transmitted on a network, but information related to that data. m For example, network bandwidth values m System logs on network equipment q Sometimes needs to examine the packets themselves. m Diagnose some particularly tricky network problems q Widely used open source tool for directly analyzing packets: tcpdump m http://www.tcpdump.org/ Network Analyzer 1-1 Caution q Before you use tcpdump or other analyzer: m Will be able to see some private data m Consult/research Legal implication first m Respect the privacy of other users Network Analyzer 1-2 1 What Tcpdump can do for you q View the entire data portion of an Ethernet frame or other link layer protocol m An IP packet m An ARP packet m Or any protocol at a higher layer than Ethernet. q Very useful m Tcpdump is to a network administrator like a microscope to a biologist. m Give a very clear picture of a specific part of your network m Can be used when the problem is simply that something is not working properly. Network Analyzer 1-3 What tcpdump can do for you? q Case1 : Web browser can not load pages from a server – it hangs. m Problem with client? Server? Or between? m Run tcpdump while loading • Watch every stage to see the following – DNS query – HTTP request to server – Server respond q Case 2: help debug denial of service attacks. -
I3: Maximizing Packet Capture Performance
I3: Maximizing Packet Capture Performance Andrew Brown Agenda • Why do captures drop packets, how can you tell? • Software considerations • Hardware considerations • Potential hardware improvements • Test configurations/parameters • Performance results Sharkfest 2014 What is a drop? • Failure to capture a packet that is part of the traffic in which you’re interested • Dropped packets tend to be the most important • Capture filter will not necessarily help Sharkfest 2014 Why do drops occur? • Applications don’t know that their data is being captured • Result: Only one chance to capture a packet • What can go wrong? Let’s look at the life of a packet Sharkfest 2014 Internal packet flow • Path of a packet from NIC to application (Linux) • Switch output queue drops • Interface drops • Kernel drops Sharkfest 2014 Identifying drops • Software reports drops • L4 indicators (TCP ACKed lost segment) • L7 indicators (app-level sequence numbers revealed by dissector) Sharkfest 2014 When is (and isn’t) it necessary to take steps to maximize capture performance? • Not typically necessary when capturing traffic of <= 1G end device • More commonly necessary when capturing uplink traffic from a TAP or SPAN port • Some sort of action is almost always necessary at 10G • Methods described aren’t always necessary • Methods focus on free solutions Sharkfest 2014 Software considerations - Windows • Quit unnecessary programs • Avoid Wireshark for capturing ˗ Saves to TEMP ˗ Additional processing for packet statistics • Uses CPU • Uses memory over time, can lead -
Scapy–A Python Tool for Security Testing
ien r Sc ce & te S u y p s t m e o m C s Journal of Bansal and Bansal, J Comput Sci Syst Biol 2015, 8:3 f B o i l o a DOI: 10.4172/jcsb.1000182 l o n r g u y o J Computer Science & Systems Biology ISSN: 0974-7230 Research Article Article OpenOpen Access Access Scapy–A Python Tool For Security Testing Shipra Bansal1* and Nitin Bansal2 1Department of Computer Applications, Lovely Professional University, Jalandhar, India 2Department of Management, Lovely Professional University, Jalandhar, India Abstract Security Testing is the essential method of any information System and this method is used to detect flaws in the security measures in an Information System which protect the data from an unauthorized access. Passing through the Security testing method does not ensure that flaws are not present in the System. Python is a new emerging Programming language. This research paper looks into the tool named Scapy which is based on Python language; lists out some vital commands, explanation with examples and uses of Security Testing. This research paper, being introductory one tries to give a brief description and understandable usage of the security Testing tool. Keywords: Security testing; Python; Scapy; Flaws Stackless is used for concurrency and PyPy has greater speed execution than CPython. Its extension is .py normally. Introduction Introduction to scapy Security is defined as “No unauthorized Access of information”. Security is very essential to maintain the integrity of System [1,2]. Scapy is a tool for manipulating interactive packets. This tool is Security Testing is the first step to detect flaws in the security measures totally based on Python language. -
Of Mobile Devices: a Survey on Network Traffic Analysis
1 The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis Mauro Conti, Senior Member, IEEE, QianQian Li, Alberto Maragno, and Riccardo Spolaor*, Member, IEEE. Abstract—In recent years, mobile devices (e.g., smartphones elements enable both smartphones and tablets to have the and tablets) have met an increasing commercial success and same functionalities typically offered by laptops and desktop have become a fundamental element of the everyday life for computers. billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice According to the statistics reported in [1], smartphone calls and messages) but also for more advanced tasks made users were 25:3% of the global population in 2015, and this possible by an enormous amount of multi-purpose applications percentage is expected to grow till 37% in 2020. Similarly, the (e.g., finance, gaming, and shopping). As a result, those devices statistics about tablets reported in [2] indicate a global penetra- generate a significant network traffic (a consistent part of the overall Internet traffic). For this reason, the research community tion of 13:8% in 2015, expected to reach 19:2% in 2020. The has been investigating security and privacy issues that are related driving forces of this tremendous success are the ubiquitous to the network traffic generated by mobile devices, which could Internet connectivity, thanks to the worldwide deployment of be analyzed to obtain information useful for a variety of goals cellular and Wi-Fi networks, and a large number of apps (ranging from fine-grained user profiling to device security and available in the official (and unofficial) marketplaces. -
PF: the Openbsd Packet Filter
PF: The OpenBSD Packet Filter Languages: [en] [de] [es] [fr] [id] [ja] [pl] [up to FAQ] [Next: Getting Started] PF: The OpenBSD Packet Filter Table of Contents ● Basic Configuration ❍ Getting Started ❍ Lists and Macros ❍ Tables ❍ Packet Filtering ❍ Network Address Translation ❍ Traffic Redirection (Port Forwarding) ❍ Shortcuts For Creating Rulesets ● Advanced Configuration ❍ Runtime Options ❍ Scrub (Packet Normalization) ❍ Anchors and Named (Sub) Rulesets ❍ Packet Queueing and Prioritization ❍ Address Pools and Load Balancing ❍ Packet Tagging ● Additional Topics ❍ Logging ❍ Performance ❍ Issues with FTP ❍ Authpf: User Shell for Authenticating Gateways ● Example Rulesets ❍ Example: Firewall for Home or Small Office Packet Filter (from here on referred to as PF) is OpenBSD's system for filtering TCP/IP traffic and doing Network Address Translation. PF is also capable of normalizing and conditioning TCP/IP traffic and providing bandwidth control and packet prioritization. PF has been a part of the GENERIC OpenBSD kernel since OpenBSD 3.0. Previous OpenBSD releases used a different firewall/NAT package which is no longer supported. PF was originally developed by Daniel Hartmeier and is now maintained and developed by Daniel and the rest of the OpenBSD team. This set of documents is intended as a general introduction to the PF system as run on OpenBSD. It is intended to be used as a supplement to the man pages, not as a replacement for them. This document covers all of PF's major features. For a complete and http://www.openbsd.org/faq/pf/index.html (1 of 2) [02/06/2005 14:54:58] PF: The OpenBSD Packet Filter in-depth view of what PF can do, please start by reading the pf(4) man page. -
Tcpdump Basics
TCPdump Basics What we will cover: What is/are TCPdump/WinDump? Why use TCPdump? Installation of TCPdump on Unix/Windows It’s installed, now what? Changing the amount of data collected Reading TCPdump/WinDump Output TCP Flags in TCPdump/WinDump Absolute & Relative Sequence Numbers Dumping TCPdump/WinDump output in hexadecimal format TCPdump ManPage TCPdump is a tool we can use for packet analysis. We will not use ethereal (wireshark) because it does “too much” for us. TCPdump will keep everything “raw” and that’s the way we like it! *note: it is expected that the reader will try out all the TCPdump/WinDump commands listed in the lesson on their own computers as well as the practical exercises. You have to actually run the commands to learn how to use the tool. What is/are TCPdump/WinDump? TCPdump, and its cousin WinDump, is software that allows us to see inside the traffic activity that occurs on a network. TCPdump is a Unix tool used to gather data from the network, decipher the bits, and display the output in a human readable format (granted it does take a little bit of instruction to learn the TCPdump language). Why use TCPdump? Network traffic travels in data packets; each data packet contains the information that it needs to travel across the network. This information is contained in a TCP header. A TCP header will contain the destination and source address, state information, and protocol identifiers. The rest of the packet contains the data that is being sent. Devices that are responsible for routing read the information in these packets and send them to their correct destination. -
Build Network Packets with Scapy
SharkFest ’18 Europe Handcrafted packets build network packets with Scapy Uli Heilmeier Krones AG #sf18eu#sf18eu •• ImperialImperial RidingRiding SchoolSchool RenaissanceRenaissance ViennaVienna •• OctOct 2929 -- NovNov 22 Scan me... pak=IP(dst="10.80.49.*")/ \ TCP(dport=[23,21], \ sport=RandShort(),flags="SAUFP") ans,unansw=sr(pak, timeout=1) #sf18eu • Imperial Riding School Renaissance Vienna • Oct 29 - Nov 2 Stacking layers dnspkt= \ Ether()/ \ IPv6(dst="2001:db8::1")/ \ UDP()/ \ DNS(rd=1,qd= \ DNSQR(qname="wireshark.org")) #sf18eu • Imperial Riding School Renaissance Vienna • Oct 29 - Nov 2 #sf18eu • Imperial Riding School Renaissance Vienna • Oct 29 - Nov 2 Working with packets dnspkt[UDP] #or dnspkt[2] dnspkt[DNSQR].qtype="AAAA" dnspkt[IPv6].payload dnspkt[Ether].payload.payload dnspkt[UDP].chksum=0xffff dnspkt[UDP].chksum del(dnspkt[UDP].chksum) #sf18eu • Imperial Riding School Renaissance Vienna • Oct 29 - Nov 2 Working with packets dnspkt.sprintf("Destination IP is %IPv6.dst%") dnspkt.summary() ls(dnspkt) dnspkt.command() dnspkt.pdfdump(filename="../dns.pdf") #sf18eu • Imperial Riding School Renaissance Vienna • Oct 29 - Nov 2 ff ff ff ff ff ff 00 00 00 00 00 00 86 dd 60 00 Ethernet 00 00 00 27 11 40 00 00 00 00 00 00 00 00 00 00 dst ↵:↵:↵:↵:↵:↵ 00 00 00 00 00 00 20 01 0d b8 00 00 00 00 00 00 src 00:00:00:00:00:00 00 00 00 00 00 01 00 35 00 35 00 27 ff ff 00 00 type 0x86dd 01 00 00 01 00 00 00 00 00 00 09 77 69 72 65 73 IPv6 68 61 72 6b 03 6f 72 67 00 00 01 00 01 version 6 tc 0 fl 0 plen 39 nh UDP hlim 64 src :: dst 2001:db8::1 -
Packet Crafting Using Scapy
Packet Crafting using Scapy by William Zereneh Bachelor of Science, Toronto, 2006 A thesis Presented to Ryerson University in partial fulfillment of the requirements for the degree of Master of Engineering in the Program of Computer Networks Toronto, Ontario, Canada, 2011 ©William Zereneh 2011 Abstract This paper will introduce both Packet Crafting as a testing methodology and the tool that will be used to accomplish all four aspects of this methodology; Packet Assembly, Packet Editing, Packet Re-Play and Packet Decoding. Scapy is an Open Source network programming language based on Python programming language, will be used in this project. The tool will be used to capture packets off the wire, create others by layering protocols as needed, altering the content of Ethernet, Dot3, LLC, SNAP, IP, UDP and ICMP header fields as required and finally launching such packets onto the network. In some cases the responses gathered as a result of launching such packets will not be decoded. As a result of this project, some network vulnerabilities will be explored to fully demonstrate the power of the methodology using Scapy, but never exploited to cause any damage. ii Authorʼs declaration I hereby declare that I am the sole author of this thesis I authorize Ryerson University to lend this thesis to other institutions or individuals for the purpose of scholarly research. William Zereneh I further authorize Ryerson University to reproduce this thesis by photocopying or by other means, in total or in part, at the request of other institutions or individuals for the purpose of scholarly research. William Zereneh iii Acknowledgments This paper would have not be possible if it were not for the constant reminder by my wife and kids that my “home work” has to be done first. -
BSD Projects IV – BSD Certification • Main Features • Community • Future Directions a (Very) Brief History of BSD
BSD Overview Jim Brown May 24, 2012 BSD Overview - 5/24/2012 - Jim Brown, ISD BSD Overview I – A Brief History of BSD III – Cool Hot Stuff • ATT UCB Partnership • Batteries Included • ATT(USL) Lawsuit • ZFS , Hammer • BSD Family Tree • pf Firewall, pfSense • BSD License • Capsicum • Virtualization Topics • Jails, Xen, etc. • Desktop PC-BSD II – The Core BSD Projects IV – BSD Certification • Main Features • Community • Future Directions A (Very) Brief History of BSD 1971 – ATT cheaply licenses Unix source code to many organizations, including UCB as educational material 1975 – Ken Thompson takes a sabbatical from ATT, brings the latest Unix source on tape to UCB his alma mater to run on a PDP 11 which UCB provided. (Industry/academic partnerships were much more common back then.) Computer Science students (notably Bill Joy and Chuck Haley) at UCB begin to make numerous improvements to Unix and make them available on tape as the “Berkeley Software Distribution” - BSD A (Very) Brief History of BSD Some notable CSRG • 1980 – Computer Science Research Group members (CSRG) forms at UCB with DARPA funding to make many more improvements to Unix - job control, autoreboot, fast filesystem, gigabit address space, Lisp, IPC, sockets, TCP/IP stack + applications, r* utils, machine independence, rewriting almost all ATT code with UCB/CSRG code, including many ports • 1991 – The Networking Release 2 tape is released on the Internet via anon FTP. A 386 port quickly follows by Bill and Lynne Jolitz. The NetBSD group is formed- the first Open Source community entirely on the Internet • 1992 – A commercial version, BSDI (sold for $995, 1-800-ITS-UNIX) draws the ire of USL/ATT. -
Performance Evaluation of Tcpdump
Performance Evaluation of Tcpdump Farhan Jiva University of Georgia Abstract performed relatively similar with respect to packet loss. FreeBSD performed the worst out of the op- With the onset of high-speed networks, using erating systems tested, while Windows usually dis- tcpdump in a reliable fashion can become prob- plays seemingly random spikes of packet loss. For lematic when facing the poor performance of mod- each of the datasets we tested, we found that Fedora ern operating systems. Because of this limitation, performs the best. The rest of the paper is laid out the amount of packet loss a user is willing to face as follows: is an important factor when choosing an operating system for a specific task. In this paper, we evaluate the performance of tcpdump on five modern operat- • In Section 2 we discuss some related work. ing systems. 1 Introduction • Section 3 covers our evaluation, along with our experimental setup and experimental results. The reliable usage of tcpdump as a network an- alyzing/debugging/monitoring tool is arguably a non-trivial task. With the onset of high-speed net- • In Section 4, we discuss our conclusions. works, using tcpdump in a reliable fashion can become problematic when facing the poor perfor- mance of modern operating systems. It is because of this limitation that the amount of packet loss be- 2 Related Work comes an inevitable factor when choosing an oper- ating system for a specific task. For example, a re- One approach to increasing the performance of searcher who needs to extract binary executable files packet capturing is explained by Deri et al. -
Scapy Documentation Release 2.0.1
Scapy Documentation Release 2.0.1 Philippe Biondi and the Scapy community October 24, 2009 CONTENTS 1 Introduction 3 1.1 About Scapy........................................3 1.2 What makes Scapy so special...............................3 1.3 Quick demo........................................5 1.4 Learning Python......................................7 2 Download and Installation9 2.1 Overview..........................................9 2.2 Installing Scapy v2.x....................................9 2.3 Installing Scapy v1.2.................................... 10 2.4 Optional software for special features........................... 11 2.5 Platform-specific instructions............................... 12 3 Usage 19 3.1 Starting Scapy....................................... 19 3.2 Interactive tutorial..................................... 19 3.3 Simple one-liners...................................... 42 3.4 Recipes........................................... 46 4 Advanced usage 51 4.1 ASN.1 and SNMP..................................... 51 4.2 Automata.......................................... 60 5 Build your own tools 67 5.1 Using Scapy in your tools................................. 67 5.2 Extending Scapy with add-ons............................... 68 6 Adding new protocols 71 6.1 Simple example...................................... 71 6.2 Layers........................................... 72 6.3 Dissecting......................................... 75 6.4 Building.......................................... 79 6.5 Fields........................................... -
BERKELEY PACKET FILTER: Theory, Practice and Perspectives
Alma Mater Studiorum · Universita` di Bologna SCUOLA DI SCIENZE Corso di Laurea in Informatica BERKELEY PACKET FILTER: theory, practice and perspectives Relatore: Presentata da: Chiar.mo Prof. MICHELE DI STEFANO RENZO DAVOLI Sessione II Anno Accademico 2019/2020 All operating systems sucks, but Linux just sucks less. Linus Torvalds Introduction Initially packet filtering mechanism in many Unix versions was imple- mented in the userspace, meaning that each packet was copied from the kernel-space to the user-space before being filtered. This approach resulted to be inefficient compared with the performance shown by the introduction of the BSD classic Berkeley Packet Filter (cBPF). cBPF consists of an as- sembly language for a virtual machine which resides inside the kernel. The assembly language can be used to write filters that are loaded in to the ker- nel from the user-space allowing the filtering to happen in the kernel-space without copying each packet as before. cBPF use is not limited to just the networking domain but it is also applied as a mechanism to filter system calls through seccomp mode. Seccomp allows the programmer to arbitrary select which system calls to permit, representing an useful mechanism to implement sandboxing. In order to increase the number of use cases and to update the architecture accordingly to new advancements in modern processors, the virtual machine has been rewritten and new features have been added. The result is extended Berkeley Packet Filter (eBPF) which consists of a richer assembly, more pro- gram types, maps to store key/value pairs and more components. Currently eBPF (or just BPF) is under continuous development and its capacities are evolving, although the main uses are networking and tracing.