1. In the
context of computer networks, what is a Sniffer?
Sniffers
monitor network data. A sniffer can be a self-contained software program or a
hardware device with the appropriate software or firmware programming. They
examine network traffic, making a copy of the data without redirecting or
altering it. Some sniffers work only with TCP/IP packets, but the more
sophisticated tools can work with many other protocols and at lower levels
including Ethernet frames.
2. List
three parties who are doing network packet sniffing as a part of their
day-to-day work.
(i) Network
Engineers
(ii) Network
Managers
(iii) System
Administrators
3. How does
a sniffer work?
Packet
sniffers capture "binary" data passing through the network, most if
not all decent sniffers "decode" this data into a human readable
form. To make it even easier (for humans) another step occurs known as
"protocol analysis". There is a varying degree of the analysis that
takes place, some are simple, just breaking down the "packet"
information. Others are more complex giving "detailed" information
about what it sees on the packet.
In other
words, The sniffer program tells a computer, specifically its Network Interface
Card (NIC), to stop ignoring all the traffic headed to other computers and pay
attention to them. It does this by placing the NIC in a state known as
promiscuous mode. Once a NIC is promiscuous, a status that requires
administrative or root privileges, a machine can see all the data transmitted
on its segment. The program then begins a constant read of all information
entering the PC via the network card. As pointed out in A Beginner's Guide to
the Internet, data traveling along the network comes as frames, or packets,
bursts of bits formatted to specific protocols. Because of this strict
formatting, a sniffer can peel away the layers of encapsulation and decode the
relevant information stored within: source computer, destination computer,
targeted port number, payload, in short - every piece of information exchanged
between two computers.
4. Why
should users be concerned on sniffers?
A packet
sniffer, sometimes referred to as a network monitor or network analyzer, can be
used legitimately by a network or system administrator to monitor and
troubleshoot network traffic. Using the information captured by the packet
sniffer an administrator can identify erroneous packets and use the data to
pinpoint bottlenecks and help maintain efficient network data transmission.
In its
simple form a packet sniffer simply captures all of the packets of data that
pass through a given network interface. Typically, the packet sniffer would
only capture packets that were intended for the machine in question. However,
if placed into promiscuous mode, the packet sniffer is also capable of
capturing ALL packets traversing the network regardless of destination.
By placing a
packet sniffer on a network in promiscuous mode, a malicious intruder can
capture and analyze all of the network traffic. Within a given network,
username and password information is generally transmitted in clear text which
means that the information would be view able by analyzing the packets being
transmitted.
A packet
sniffer can only capture packet information within a given subnet. So, it’s not
possible for a malicious attacker to place a packet sniffer on their home ISP
network and capture network traffic from inside your corporate network
(although there are ways that exist to more or less "hijack" services
running on your internal network to effectively perform packet sniffing from a
remote location). In order to do so, the packet sniffer needs to be running on
a computer that is inside the corporate network as well. However, if one
machine on the internal network becomes compromised through a Trojan or other
security breach, the intruder could run a packet sniffer from that machine and
use the captured username and password information to compromise other machines
on the network.
Detecting
rogue packet sniffers on your network is not an easy task. By its very nature
the packet sniffer is passive. It simply captures the packets that are
traveling to the network interface it is monitoring. That means there is
generally no signature or erroneous traffic to look for that would identify a
machine running a packet sniffer. There are ways to identify network interfaces
on your network that are running in promiscuous mode though and this might be
used as a means for locating rogue packet sniffers.
No comments:
Post a Comment