RE: analysing captured packets

From: Dean De Beer (ddb@plazacollege.edu)
Date: Thu Apr 06 2006 - 14:41:32 EDT


Hi Robin,

You had mentioned using Ethereal. You might want to have a look at their
Filter Reference page. It gives really detailed breakdowns on each filter.
http://www.ethereal.com/docs/dfref/

For example:
http://www.ethereal.com/docs/dfref/e/eapol.html - 802.1x Authentication
traffic.

HTH,

Dean

-----Original Message-----
From: Robin Wood [mailto:dninja@gmail.com]
Sent: Tuesday, April 04, 2006 11:05 AM
To: Dan Goldberg
Cc: pagvac; pen-test@securityfocus.com
Subject: Re: analysing captured packets

Thanks all.

I'm going to have a look through these as they should give me a good base.
The reason I want to learn about this is I'm getting into wireless
pen-testing and so will need to analyse the data I capture during tests. So
I'm not actually looking for analysys of attacks, more higher level captured
data, things like re-building emails, watching windows domain logins that
kind of thing.

Obviously, the same high level data flows over wireless as over wired so
techniques for either would help.

I should have been more specific when I posted my original question.

On 4/4/06, Dan Goldberg <dan@madjic.net> wrote:
> This is a good place to start learning about "what to look for":
> http://www.packet-level.com/productsServ.htm#labkit
> (I am not affiliated - nor have I been to the training)
>
> Of course the SANS Institutes Intrusion Detection course is a great
> place to develop hands on experience with analysis and the mastering
> packet analysis course form SANS to. (I am loosely affiliated with the
> SANS institute but do not gain personally from these activities)
>
> Dan
>
> pagvac wrote:
> > I know that what I'm gonna say may sound silly, but what I recommend
> > you is simply to play with analyzing traffic A LOT. Just watch the
> > packets, filter them by protocol, IP address, or whatever you're
> > interested in (Ethereal is great for filters). Try to follow
> > different protocol "conversations" and try to understand what the
> > requests and responses mean.
> >
> > Good luck on your sniffing experience my friend :-)
> >
> > Robin Wood wrote:
> >
> >>>Hi Can anyone give any pointers to good tutorials on how to go
> >>>about analysing network traffic captured during a pen-test.
> >>>
> >>>I'm currently using ethereal but I'm not necessarily looking for an
> >>>ethereal tutorial more a howto on what to look for in capture
> >>>files. Things like good protocols to spot (e.g. ftp logs in in
> >>>plaintext so you can grab login details), how to recognise what is
> >>>going on by watching the high level handshakes (e.g. a http get is
> >>>usually followed by a response containing html), things like that.
> >>>
> >>>Thanks
> >>>
> >>>Robin
> >>>
> >>>-------------------------------------------------------------------
> >>>-----------
> >>> This List Sponsored by: Cenzic
> >>>
> >>>Concerned about Web Application Security? As attacks through web
> >>>applications continue to rise, you need to proactively protect your
> >>>applications from hackers. Cenzic has the most comprehensive
> >>>solutions to meet your application security penetration testing and
> >>>vulnerability management needs. You have an option to go with a
> >>>managed service (Cenzic ClickToSecure) or an enterprise software
> >>>(Cenzic Hailstorm). Download FREE whitepaper on how a managed
> >>>service can help you:
> >>>http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a
> >>>limited time we can do a FREE audit for you to confirm your results
> >>>from other product. Contact us at request@cenzic.com
> >>>-------------------------------------------------------------------
> >>>-----------
> >>>
> >>>
> >>>
> >
> >
>
> ----------------------------------------------------------------------
> --------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> As attacks through web applications continue to rise, you need to
> proactively protect your applications from hackers. Cenzic has the
> most comprehensive solutions to meet your application security
> penetration testing and vulnerability management needs. You have an
> option to go with a managed service (Cenzic ClickToSecure) or an
> enterprise software (Cenzic Hailstorm).
> Download FREE whitepaper on how a managed service can help you:
> http://www.cenzic.com/forms/ec.php?pubid=10025
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com
>
----------------------------------------------------------------------------

--
>
>
> --
> Dan Goldberg
> MADJiC Consulting, Inc.
> Information Security Services
> http://www.madjic.net
> --
> dan@madjic.net
> GPG Fingerprint: FC61 396F 8952 EC76 8CCB DAF1 4DD9 5B4C 07E0 B0BA 
> Public Key: http://www.madjic.net/dbg.asc
> --
> Incident Handler - Internet Storm Center http://isc.sans.org/
>
----------------------------------------------------------------------------
--
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to
rise, 
you need to proactively protect your applications from hackers. Cenzic has
the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com for details.
----------------------------------------------------------------------------
--
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:48 EDT