Presentation is loading. Please wait.

Presentation is loading. Please wait.

Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.

Similar presentations


Presentation on theme: "Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication."— Presentation transcript:

1 Packet Analyzers, a Threat to Network Security

2 Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication protocols How packet analyzers work Who uses packet analyzers

3 Agenda (Continued) What devices packet analyzers can run on How to detect packet analyzers How to protect against packet analyzers End user awareness Conclusion Questions

4 Introduction Is confidential information that is sent out across the network only viewable by the sender and its recipient(s)? Networking standards were designed for compatibility and ease of use Security was not a major issue

5 Packet Analyzer Background A packet analyzer is a tool whose intended purpose was to help network administrators troubleshoot and diagnose their local area networks Packet analyzers can also fall into the wrong hands for malicious purposes

6 LAN Technologies & Network Protocols LAN technologies Shared mediums Ethernet Most common technology today Operates at various speeds and mediums

7 LAN Technologies & Network Protocols (Continued) Network protocols Protocols are a set of rules each machine must follow in order to communicate TCP/IP Most commonly used protocol in corporate networks The only protocol used on the Internet

8 LAN Technologies & Network Protocols (Continued) Network communications Everybody on a repeated network sees the same transmitted data It is the responsibility of the stations to ignore data that is not intended for them (honor system)

9 LAN Technologies & Network Protocols (Continued) Switches reduce the amount of stations that can view the same transmitted data Tries to keep track of where stations are located so it can direct data only to its intended recipient If the switch does not know where to send the data, it is forced to send it to everyone Routers never broadcast data Will only send data directly to a machine or another router

10 Communication Protocols Insecure communication protocols FTP (file transfer protocol) HTTP (hyper-text transfer protocol) SMTP (simple mail transfer protocol) POP (post office protocol) IMAP (internet message access protocol) Telnet SNMP (simple network management protocol)

11 Communication Protocols (Continued) Secure communication protocols FTPS- secure FTP HTTPS- secure HTTP No secure SMTP, POP, or IMAP PGP (Pretty Good Privacy) - encrypts message within SMTP, POP, or IMAP SSH (secure shell) - answer to secure Telnet

12 How Packet Analyzers Work Can be installed on numerous operating systems or can be dedicated hardware Run under promiscuous mode Can define filters to only capture wanted data Converts binary data into a comprehensible format Can only convert clear text Similar to a wire tap performed on phone lines

13 How Packet Analyzers Work (Continued) Ethereal (http://www.ethereal.com)

14 How Packet Analyzers Work (Continued) Iris (http://www.eeye.com/html/Products/Iris)

15 Who Uses Packet Analyzers Network administrators Troubleshoot and diagnose the network Intrusion detection Network intruders Gather sensitive data Monitor web browsing, email, or instant message communication

16 Who Uses Packet Analyzers (Continued) The U.S. government Crime prevention Carnivore Can capture all network traffic of a particular user or IP Installed at suspect’s ISP The USA PATRIOT Act has reduced restrictions previously placed on Carnivore U.S. attorney or state attorney general can order the installation of Carnivore without going to court Law enforcement agents can get blank warrants

17 What Packet Analyzers Can Run On Can be installed on desktops, laptops, and PDA’s (personal digital assistants) Can be purchased or downloaded for free Can work on any type of network as long as the hardware and software support it, including wireless networks

18 What Packet Analyzers Can Run On (Continued) Small size of PDA’s and palm-sized laptops allow packet analyzers to fit in a shirt pocket

19 How to Detect Packet Analyzers Packet analyzers do not transmit data, making detection difficult Other network-based applications may give away its presence, email, web browser, ARP (address resolution protocol), DNS (domain name service) Network administrator can ‘trick’ the network analyzer to reply Specialized programs to detect network analyzers AntiSniff, CPM (check promiscuous mode), neped, sentinel, and ifstatus

20 How to Protect Against Packet Analyzers Intrusion detection/prevention system When possible, restrict network access by hardware address Disable unused ports Disable port mirroring when not in use Password protect networking devices (don’t use default passwords) Only use secure operating systems that prevent end users from installing packet analyzers (Windows NT- based, Linux, or UNIX) Virus scanners to detect malicious packet analyzing software

21 End User Awareness Know what information is sensitive and how to make sure transmission methods are secure Example: use HTTPS for online banking/shopping Look at alternative methods of transmittal Example: Using SSH instead of Telnet Know network administrators can be using packet analyzers to monitor you Don’t do anything you shouldn’t at work!!!

22 Conclusion When computers communicate over networks, their communication is at risk of being intercepted and monitored by packet analyzers. A packet analyzer can capture sensitive data, such as credit card numbers, usernames, or passwords. It is important to be protected against network intrusions, as well as be aware of how secure one’s network communication is.

23 Questions


Download ppt "Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication."

Similar presentations


Ads by Google