Sniffing
Sniffing
Goal: This lab will introduce you to methods of network scanning and sniffing, which is often used for
reconnaissance before attacking/hacking a computer system/network. You will learn various tools that
network security professionals use to enumerate network resources.
Prior Knowledge: We will be using a lot of Linux commands starting from this lab. If you need a
refresher on Linux, please visit the Linux Primer in SAT3812 on Canvas.
Q1.1.1: Approximately how many cybersecurity tools are included with Kali?
We need to update Kali now. On Kali VM, run the following command:
apt-get update
1|Page
SAT3812 – Lab 2
2) Use the “tab” key on your keyboard to auto-complete a command or a filename. For example, say you
want to type in “ls /etc/network/interfaces”, you can just type in “ls /etc/network/int” then hit the TAB
key, then Kali will auto complete the rest for you.
3) (This trick can be confusing with trick 2. Skip it if you don’t like to use it.)
Use to the right arrow key “->” to complete a history command. For example, after step 2, when you
type “ls ”, the command prompt will show “ls /etc/network/int” with gray color on the latter part. You
can use the arrow key to complete the command, or “Backback” to go back a few characters.
Scanning from the command line can be a very powerful tool for network security professionals.
Learning how to navigate and use a command line, is more consistent and less prone to changes, as with
the applications GUI. Although new commands may be introduced, the original commands remain the
same. Building on this idea the command line can also give the security professional a broader set of
options when conducting scans buy allowing them to use options that may not be built in to the GUI
version of the same program. This may allow them to conduct the scan quicker or more importantly
with greater stealth capabilities.
In this section you will use Nmap via the command-line function (not the GUI function) of this
application to permit for additional flexibility and for you to become more efficient in testing your
network. Nmap is a powerful penetration testing and security auditing utility.
Warning: Due to security reasons, you can NOT Nmap Internet hosts from VMs. However, you
can Nmap any internal VM hosts (within 192.168.2.x).
2|Page
SAT3812 – Lab 2
If the command needs root privileges, you can run
su
or
sudo xxxxx (the actual linux command)
Please create a TCP SYN stealth scan that fingerprints the OS for your IP range (192.168.2.0/24).
Create a FIN scan on your range of IP addresses that you have been provided for this course.
Create a PING scan on the entire 192.168.2.0/24 network. Save the output (as normal output) in a file
called network_ping_scan.txt
Once you login FTP from Kali 2 to Kali, please stop the packet sniffing on Kali. Wireshark live capture
requires a lot of memory and may slow down your VM. You may see something like below:
4|Page
SAT3812 – Lab 2
In Wireshark, type “FTP” in display filter to filter out other packets. See screenshot below.
Look through these FTP packets, one of them has your username, and the other has your password in
clear text. See screenshot below for username.
5|Page
SAT3812 – Lab 2
Screenshot 1: Capture a screenshot of a FTP packet containing the password in clear text.
This exercise shows you how dangerous it is to use unencrypted telnet, ftp, email, and web
authentication.
Q3.2.1 How can you protect yourself from sniffers stealing username and passwords, along with
viewing the data translated within a given remote connection?
ssh is a network protocol that establishes an encrypted connection between two devices allowing for
network traffic to be securely passed.
Once you ssh from Kali 2 to Kali, stop your WireShark capture on your Kali machine. Again, click on
SSH packets and look through them.
Q4.1.1: From the WireShark output, what version of ssh are you using?
Q4.1.2: Explain in a brief paragraph what you observed from your WireShark output. Were you
able to view the username and password? Why or why not?
Screenshot 2: Capture a screenshot of a packet containing the results from ssh and submit it with
your lab, this should show the version of ssh that you are using.
7|Page
SAT3812 – Lab 2
General Questions
GQ.2. On a scale of 1-10 (with 1 being very simple and 10 being very challenging), how would you
rate this lab?
GQ.3. Did you watch the lab video? If yes, how did the lab video help you finish the lab (on a scale
of 1-10, with 1 being not helpful and 10 being very helpful)?
Lab Questions
Q1.1.1: Approximately how many cybersecurity tools are included with Kali?
Screenshot 1: Capture a screenshot of a FTP packet containing the password in clear text.
Q3.2.1 How can you protect yourself from sniffers stealing username and passwords, along with
viewing the data translated within a given remote connection?
Q4.1.1: From the WireShark output, what version of ssh are you using?
Q4.1.2: Explain in a brief paragraph what you observed from your WireShark output. Were you
able to view the username and password? Why or why not?
Screenshot 2: Capture a screenshot of a packet containing the results from ssh and submit it with
your lab, this should show the version of ssh that you are using.
8|Page