Packet Sniffing and Sniffing Detection: Ruchi Tuli
Packet Sniffing and Sniffing Detection: Ruchi Tuli
http://dx.doi.org/10.21172/ijiet.161.04
Abstract - Packet sniffing is a process of monitoring and capturing all data packets passing thorough a given
network using a software application or a hardware device. Sniffers can be used to monitor all sorts of traffic
either protected or unprotected. Using sniffers, attacker can gain information which might be helpful for
further attacks. This paper discusses the basic workingof a packet sniffer, network protocols that are
vulnerable to sniffing, various software that can be used for sniffing. This paper also describes possible
defensive techniques used to defend against sniffing attacks. Finally the papers ends with describing some
sniffing detection techniques. Sniffers are not hacking tools but they can help a hacker to launch further
attacks such as session hijacking, DOS attacks, MITM attacks etc.
I.INTRODUCTION
A sniffer is a program or a device that eavesdrops on the network traffic by grabbing information
travelling over a network. Sniffers basically are “Data Interception” technology[1]. They work because
Ethernet was built around a principle of sharing. Most networks use broadcast technology wherein
messages for one computer can be read by another computer on that network. In practice, all the other
computers except the one for which the message is meant, will ignore that message. However, computers
can be made to accept messages even if they are not meant for them. This is done by means of a
sniffer[1].
Using sniffing, the attacker can capture packets like Syslog traffic, DNS traffic, web traffic, Email and
other types of data traffic. By capturing these packets, an attacker can reveal information such as data,
username and passwords from protocols such as HTTP, POP, IMAP, SMTP, FTP and Telnet. The
process of sniffing is performed by using Promiscuous ports. This paper discusses basic working of a
packet sniffer, protocols that are vulnerable to sniffing, various types of tools used for sniffing,
defensive techniques to defend against sniffing attacks and sniffing detection techniques[2].
II.WORKING OF SNIFFERS
In the process of sniffing, an attacker gets connected to the target network to sniff the packets. Using
sniffers, which turns Network Interface Card (NIC) of the attacker’s system into promiscuous mode,
attacker captures the packet[3]. Once attacker captures the packet, it can decrypt these packets to extract
the information. Sniffers can use used to hack a system or a network. The steps that an attacker follows to
make use of sniffers to hack a network are listedbelow and shown in Figure 1:
a) An attacker who decides to hack a network first discovers the appropriate switch to access the
network and connects a system to one of the ports on the switch.
b) After succeeding in connecting to the switch, attacker tries to determine network information
such as network topology by using network discovery tools.
c) By analyzing the network topology, the attacker identifies the victim’s machine to target the
attacks.
d) After target identification, the attacker uses ARP spoofing techniques to send a fake (spoofed)
ARP message
e) The previous step helps the attacker to divert all the traffic from the victim’s computer to the
attacker’s computer. This is a man-in-the-middle (MITM) attack.
f) Now the attacker can see all the data packets sent and received by the victim and can extract the
confidential information such as username, password, credit card details, PIN etc.
File Transfer Protocol (FTP) enables clients to share files between computers in a network. This protocol
fails to provide encryption. So attackers sniff data as well as user credentials by running tools like Cain &
Abel
3.7 IMAP
Internet Message Access Protocol (IMAP) allows a client to access and manipulate electronic mail
messages on a server. This protocol offers inadequate security, which allows attackers to obtain data and
user credentials in clear text.
Figure 2 :- Wireshark
4.2 Zenmap
Zenmap is the authorized graphical user interface(GUI) for the Nmap Security Scanner. Zenmap is
accessible for Windows, Linux, Mac, and BSD. Zenmap may be used to read live captures or save
captures for later viewing. With Zenmap you can enable the features of Nmap to help you with: network
inventory, managing service upgrade schedules, and monitoring host or service uptime [5]. Features
comprise: Host discovery; port scanning; version detection;OS detection;scriptable interface;web
scanning; full IPv6 support; Nping support; fast scanning;and much more.Zenmap is the official Nmap
Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD,etc.) free and open
source application which aims to make Nmap easy for beginners to use while providing advanced features
for experienced Nmap users.
4.3 AngryIPScanner
AngryIP Scanner [6] is an open source, snappy platform scanner that is designed to be incredibly fast and
very easy to use. AngryIP deals the following features: Portable zero installation on certain platforms;
ping checks; NetBIOS information; resolveshostnames; determines MAC address; can determine
currently logged-in user; plug in system; scan results can be saved as CSV, TXT, XML, or IP-Portlist;
and fast, multi-threaded scanning. AngryIP Scanner maintained by angryziber.
recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing
routing protocols. The program does not utilize any software vulnerabilities or bugs that could not be
fixed with little attempt. It covers some security aspects/weakness present in protocol’s standards,
authentication methods and caching mechanisms; its main purpose is the simplified recovery of
passwords and credentials from various sources, however it also ships some “non-standard” utilities for
Microsoft Windows users. Cain &Abel has been developed in the hope that it will be useful for network
administrators, teachers,
securityconsultants/professionals,forensicstaff,securitysoftwarevendors,professionalpenetrationtesterande
veryoneelsethatplanstouseitforethicalreasons.Thelatestversion(Cain&Abelv4.9.56)[7]isfasterandcontainsa
lotofnewfeatureslikeAPR(ArpPoisonRouting)whichenablessniffingonswitchedLANsandMan-in-the-
Middleattacks.ThesnifferinthisversioncanalsoexamineencryptedprotocolslikeSSH-1andHTTPS, and
contains filters to capture credentials from a large range of authentication mechanisms.
Figure 6 :- TCPdump
4.6 Kismet
Kismetisan802.11layer2wirelessnetworkdetector,sniffer,andintrusiondetectionsystem.Kismetwillworkwit
hanywirelesscardwhichsupportsrawmonitoring(RFMON)mode,and(withappropriatehardware)cansniff802
.11b,802.11a,802.11g,and802.11ntraffic.Kismetalsosupportspluginswhichallowsniffingothermediasuchas
DECT.Kismetidentifiesnetworksbypassivelycollectingpacketsanddetectingstandardnamednetworks,detect
inghiddennetworks,andinferringthepresenceofnon-beaconingnetworksviadatatraffic. InSep25,2013
ReleasedthefirstversionofSmarterWi-FiManagerforAndroid [9].
Figure 7 :- Kismet
4.7 Ettercap :-
Ettercap is a complete suite for man in the middle attacks. It features sniffing of live connections, content
filtering on the fly and many other interesting tricks. It supports active and passive dissection of many
protocols and includes many features for network and host analysis [10].
Figure 8 :- Ettercap
4.8 Dsniff
This is well-known and well-designed suite which includes many tools : dsniff, filesnarf, mailsnarf,
msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files,
etc.); arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to
an attacker (e.g, due to layer-2 switching). The suite suffers from the lack of any updates in the last
decade, but it is still a great toolset for handling your password sniffing needs [11].
Figure 9 :- Dsniff
4.9 NetworkMiner
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows (but also works in
Linux/MacOSX/FreeBSD). NetworkMiner can be used as a passive network
sniffer/packetcapturingtoolinordertodetectoperatingsystems,sessions,hostnames,openportsetc.withoutputti
nganytrafficonthenetwork.NetworkMinercanalsoparsePCAPfilesforoff-lineanalysis and to
regenerate/reassemble transmitted files and certificates from PCAP
files.NetworkMinercollectsdatalikeforensicevidenceabouthostsonthenetworkratherthantocollectdataregard
ingthetrafficonthenetwork.Themainuserinterfaceviewishostcentrici.e.informationgroupedperhostrathertha
npacketcentrici.e.informationshowedasalistofpackets/frames.NetworkMinerhas,sincethefirstreleasein2007
,becomeapopulartoolamongincidentresponseteamsaswellaslawenforcement.NetworkMineristodayusedbyc
ompaniesandorganizationsallovertheworld[12].
Figure 10 :- NetworkMiner
4.10 Capsa Network Analyzer
Capsa network analyzer is a network-monitoring tool that captures all the data transmitted over the
network and provides a wide range of analysis statistics in an intuitive and graphic way. The tool helps to
analyze and troubleshoot the problem that has occurred (if any) in the network. It is also able to perform
reliable network forensics, advanced protocol analyzing, in-depth packet decoding and automatic expert
diagnosing. It helps to detect network vulnerabilities. An attacker can use this tool to sniff packets from
the target network[13].
Just send a ping request to the suspected machine with its IP address and incorrect MAC address. The
adapter will reject it as the MAC address does not match, whereas the suspect machine running the sniffer
responds to it, as it does not reject packets with a different MAC address. Thus, this response will identify
the sniffer in the network.
6.2.2 ARPWatch
ARWatch is a computer software tool for monitoring Address Resolution Protocol traffic on a computer
network. It generates a log of observed pairing of IP addresses with MAC addresses along with a time
stamp when the pairing appeared on the network. It also has the option of sending an email to an
administrator when a pairing changes or is added. Network administrators monitor ARP activity to detect
ARP spoofing [14].
6.2.3 Snort :-
Snort is a free and open source network intrusion prevention system and network intrusion detection
system created by Martin Roesch in 1998. Snort is now developed by Sourcefire, of which Roesch is the
founder and CTO. In 2009, Snort entered InfoWorld’s Open Source Hall of Fame as one of the open
source software of all time. Snort’s open source network-based intrusion detection system (NIDS) has the
ability to perform real time traffic analysis and packet logging on Internet Protocol networks. Snort
performs protocol analysis, content searching, and content matching. These basic services have many
purposes including application-aware triggered quality of service, to de-prioritize bulk traffic when
latency sensitive applications are in use. The program can also be used to detect probes or attacks,
including, but not limited to, operating system finger printing attempts, common gateway interface, buffer
overflows, server message block probes, and stealth port scans. Snort can be configured in three main
modes : sniffer, packet logger, and network intrusion detection [15].
VII.CONCLUSION
In this paper, some important packet sniffing tools that monitor and capture the traffic between legitimate
users are discussed. Each tool has a different way of working and its own strengths. As there is a saying –
“Prevention is better than cure”. So, some countermeasure to prevent sniffing are also discussed. As the
main aim of deploying sniffers is to capture the confidential information such as passwords, so the packet
sniffing is a serious matter for network security. Sniffers can be deployed in any environment, so the best
practice is to send the data in an encrypted form. Users can also deploy a number of techniques to detect
the sniffers on the network and protect the data from sniffing, which has been discussed in the latter part
of this paper. Sniffers are called network administrator’s nightmare as it may be difficult in certain
situations to detect the presence of sniffers.
REFERENCES
[1] S. Dhar, I. Security, M. Team, and R. Infocomm, “Sniffers Basics and Detection Information Security Management
Team,” Secur. Manag., 2007.
[2] D. D. R. P. Nimisha P. Patel, Rajan G. Patel, “Packet Sniffing : Network Wiretapping Packet Sniffing : Network
Wiretapping,” Pack. Sniff. Netw. Wiretapping, vol. 2, no. February, pp. 6–7, 2009.
[3] I. Kaur, H. Kaur, and E. G. Singh, “Analysing Various Packet Sniffing Tools,” Int. J. Electr. Electron. Comput. Sci. Eng.,
vol. 1, no. 5, pp. 65–69, 2014.
[4] Wireshark, “https://www.wireshark.org/docs/wsug_html_chunked/.” [Online]. Available:
https://www.wireshark.org/docs/wsug_html_chunked/.
[5] Zenmap, “http://nmap.org/book/zenmap.html.” [Online]. Available: http://nmap.org/book/zenmap.html%0A.
[6] AngryIP, “http://angryip.org/.” [Online]. Available: http://angryip.org/%0A.
[7] Cain, “https://web.archive.org/web/20190603235413if_/http://www.oxid.it/cain.html.” [Online]. Available:
https://web.archive.org/web/20190603235413if_/http://www.oxid.it/cain.html.
[8] TCPdump, “TCPdump.org.” [Online]. Available: https://www.tcpdump.org/.
[9] Kismet, “https://www.kismetwireless.net/.” [Online]. Available: https://www.kismetwireless.net/.
[10] Ettercap, “https://www.ettercap-project.org/.” [Online]. Available: https://www.ettercap-project.org/.
[11] Dsniff, “https://github.com/tecknicaltom/dsniff.” [Online]. Available: https://github.com/tecknicaltom/dsniff.
[12] NetworkMiner, “https://www.netresec.com/.” [Online]. Available: https://www.netresec.com/.
[13] Capsa, “https://www.colasoft.com/capsa/.” [Online]. Available: https://www.colasoft.com/capsa/.
[14] M. A. Qadeer, M. Zahid, A. Iqbal, and M. R. Siddiqui, “Network traffic analysis and intrusion detection using packet
sniffer,” 2nd Int. Conf. Commun. Softw. Networks, ICCSN 2010, pp. 313–317, 2010.