Mobile Packet Sniffer Ofer Borosh Vadim Lanzman Dr. Chen Avin

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

ARP AND RARP ROUTED AND ROUTING Tyler Bish. ARP There are a variety of ways that devices can determine the MAC addresses they need to add to the encapsulated.
1 Address Resolution Protocol (ARP) Relates to Lab 2. This module is about the address resolution protocol.
1 Address Resolution Protocol (ARP) Relates to Lab 2. This module is about the address resolution protocol.
COEN 252 Computer Forensics Remote Sniffer Detection.
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
Review of Important Networking Concepts
Presented by Serge Kpan LTEC Network Systems Administration 1.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Data Communications I & II Project Sequence Tom Costello.
MAC AddressesCS-502 (EMC) Fall Clarification — MAC Addresses and IP Networks CS-502, Operating Systems Fall 2009 (EMC) (Slides include materials.
COS 461: Computer Networks
Detection of Promiscuous nodes Using Arp Packets By Engin Arslan.
Android An open handset alliance project Janice Garcia September 18, 2008 MIS 304.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
InterVLAN Routing Design and Implementation. What Routers Do Intelligent, dynamic routing protocols for packet transport Packet filtering capabilities.
Chapter 4: Managing LAN Traffic
CSCD433 Advanced Networks Fall 2011 Raw vs. Cooked Sockets.
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
COEN 252 Computer Forensics
Copyright© Jeffrey Jongko, Ateneo de Manila University Android.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Network Security: Lab#4-2 Packet Sniffers J. H. Wang Dec. 2, 2013.
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
Introduction to Networking and TCP/IP J. H. Wang Jun. 8, 2005.
Address Resolution Protocol(ARP) By:Protogenius. Overview Introduction When ARP is used? Types of ARP message ARP Message Format Example use of ARP ARP.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Introduction to InfoSec – Recitation 11 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Raw Sockets Vivek Ramachandran. A day in the life of Network Packet.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
IP Addresses Universal address regardless of layer 2 architecture Each address is that of an interface, not necessarily a host A host may have more than.
CHAPTER 9 Sniffing.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Packet Capture and Analysis: An Introduction to Wireshark 1.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
WiFi networks & RAW SOCKETS IL-HACK2009 Eddie Harari.
0x440 Network Sniffing.
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
Department of Computer Science & Engineering 5. Acknowledgments 4. Conclusions 3. Evaluation2. Contribution 1. Introduction REU 2008-Packet Sniffer Jose.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
1 Binding Protocol Addresses (ARP ). 2 Resolving Addresses Hardware only recognizes MAC addresses IP only uses IP addresses Consequence: software needed.
ADDRESS MAPPING ADDRESS MAPPING The delivery of a packet to a host or a router requires two levels of addressing: logical and physical. We need to be able.
Android operating system N. Sravani M. Tech(CSE) (09251D5804)
CSCD433/533 Advanced Networks Spring 2016 Lecture 15
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Fall  Computer Crimes  Operating System Identification  Firewalking 2.
What is CRKIT Framework ? Baseband Processor :  FPGA-based off-the-shelf board  Control up to 4 full-duplex wideband radios  FPGA-based System-on-Chip.
NDN-Android: NDN Networking Stack for Android Platform
Introduction to Information Security
Networks Fall 2009.
MAC Address Tables on Connected Switches
COEN 152 / 252 Computer Forensics
LAN Vulnerabilities.
Packet Sniffers Lecture 10 - NETW4006 NETW4006-Lecture09.
IP Network Layer and Ethernet Encapsulation
Virtual LANs.
CSE 4905 Network Security Overview
Computer Networks 9/17/2018 Computer Networks.
CIT 480: Securing Computer Systems
Introduction to Packet Sniffing using Ethereal
ARP: Address Resolution Protocol
IP-Spoofing and Source Routing Connections
Computer Networks ARP and RARP
Presentation transcript:

Mobile Packet Sniffer Ofer Borosh Vadim Lanzman Dr. Chen Avin Ben-Gurion University of the Negev Department of Communication Systems Engineering. Mobile Packet Sniffer Presented by: Ofer Borosh Vadim Lanzman Instructor: Dr. Chen Avin

Contents Packet Sniffing Motivation. Project Goal. Android platform. Packet capturing. Monitor mode Problem. ARP injection solution. Learning Process. Follow up. Primitive sniffer

Packet Sniffing Motivation Wi-Fi and Bluetooth networks usage is growing continuously, increasing traffic capacities in the wireless medium. Strong Need for a small and Mobile Sniffing Device. Usage of such sniffing device: Important tool for Wireless network designers. Evaluate network protocols and their performance. Understanding and debugging network problems. Address network security issues.

Project Goal Develop packet sniffer application on a compact mobile platform. Perform capturing of packets traveling in wireless networks. Store captured packets in a DB on the capturing device. Perform basic analysis of Captured data. Support the export of captured data to a PC for further analysis.

Project Goal Sniffing Interfaces: Wi-Fi 802.11 b/g Bluetooth 802.15.1 In the future: 3G, ZigBee, GSM

Android Platform Hardware: Qualcomm processor : 528 MHz TI Wi-Fi and Bluetooth integrated chip: WiLink 4.0 TI Wi-Fi driver : WL 1251 GPS ADP G 1 Software: Android Open Source Linux based OS. JAVA SDK 1.6 for Android NDK – for cross compile C files

Normal Packet Decapsulation Packet capturing Normal Packet Decapsulation Packets loose all their headers on the way to the APP layer. We a way to BYPASS the stack. APP. Application Data DATA TRANSPORT TCP/UDP Segment TCP/UDP header DATA NETWORK IP datagram IP header TCP/UDP header DATA LINK Network Frame Ethernet header IP header TCP/UDP header DATA Ethernet trailer PHY

Packet capturing Using RAW Sockets SW Implementations to bypass the stack: Raw Sockets. Tcpdump based on open source Libpcap library. Parsing and analyzing Raw packet headers. Using RAW Sockets APP. OPEN RAW SOCKET TRANSPORT NETWORK LINK Network Frame Using the same method we can inject custom made packets. Ethernet header IP header TCP/UDP header DATA Ethernet trailer PHY

Application Demo 1

Monitor Mode Problem Wi-Fi Element Operational Modes: Ideal sniffer: Master mode. Managed mode. AD-HOC mode. Promiscuous mode. Monitor Mode. WiFi card Driver LINK NETWORK TRANSPORT APP. Ethernet header IP header TCP/UDP header DATA Ethernet trailer 802.11 header Ideal sniffer: Uses Promiscuous or Monitor mode. Problem: TI Driver Prevents the Monitor and Promiscuous modes.

ARP Injection Solution We will use Arp Protocol Properties to solve the problem. Arp Protocol Basics: Arp table in every PC. Need to know the MAC address before sending the packet. Host A Arp Request (Who has IP B ? Broadcast) Host B Arp Reply( Unicast IP B is at MAC B)

ARP Injection Solution We will use Arp Protocol Properties to solve the problem. Switched network properties: Constantly Learning MAC addresses. Prevent the sniffing of neighboring traffic. MAC - A 5 MAC address port MAC - A 5 1 2 3 4 MAC - B 4 MAC - B

ARP Injection Solution Host A ARP cache Host B ARP cache MAC address IP add MAC address IP add MAC - B IP - B MAC - A IP - A Normal traffic 2 3 AP route table MAC address Port 1 MAC - A 2 MAC - B 3 Active Sniffer: IP - C MAC - C

ARP Injection Solution Host A ARP cache Host B ARP cache MAC address IP add MAC address IP add MAC - B IP - B MAC - A IP - A MAC - C MAC - C Arp Injection process 2 3 AP route table 1 MAC address Port MAC - A 2 Active Sniffer: IP - C MAC - C MAC - B 3 MAC - C 1

ARP Injection Solution Host A ARP cache Host B ARP cache MAC address IP add MAC address IP add MAC - C IP - B MAC - C IP - A Re-Routed Traffic 2 3 AP route table 1 MAC address Port MAC - A 2 Active Sniffer: IP - C MAC - C MAC - B 3 MAC - C 1

Active Sniffing Milestones Domain Scanning to find Active Sniffing targets. Arp Packet Injection to the selected targets. Enabling Traffic Rerouting to Avoid denial of service. Capture and analyze the traffic.

Application Demo 2

Learning process Development in JAVA under Android API. Working and Cross Compiling for Linux based OS. Understanding of 802.11 protocol and it’s operational modes. Raw sockets usage. Custom Packet creation and injection ARP spoofing .

Follow Up Extending the Capture interfaces to sniff ZigBee sensors. Building custom parsing engines using Raw sockets. Rewriting the driver to support Monitor mode. End much more…

Questions…?