Packet Analyzers, a Threat to Network Security

Download Report

Transcript Packet Analyzers, a Threat to Network Security

Packet Analyzers, a Threat to
Network Security
Agenda
Introduction
 The background of packet analyzers
 LAN technologies & network protocols
 Communication protocols
 How packet analyzers work
 Who uses packet analyzers

Agenda (Continued)
What devices packet analyzers can run
on
 How to detect packet analyzers
 How to protect against packet analyzers
 End user awareness
 Conclusion
 Questions

Introduction

Is confidential information that is sent out
across the network only viewable by the
sender and its recipient(s)?
Networking standards were designed for
compatibility and ease of use
 Security was not a major issue

Packet Analyzer Background
A packet analyzer is a tool whose
intended purpose was to help network
administrators troubleshoot and
diagnose their local area networks
 Packet analyzers can also fall into the
wrong hands for malicious purposes

LAN Technologies & Network
Protocols

LAN technologies
Shared mediums
 Ethernet

Most common technology today
 Operates at various speeds and mediums

LAN Technologies & Network
Protocols (Continued)

Network protocols
Protocols are a set of rules each machine
must follow in order to communicate
 TCP/IP

Most commonly used protocol in corporate
networks
 The only protocol used on the Internet

LAN Technologies & Network
Protocols (Continued)

Network
communications


Everybody on a
repeated network
sees the same
transmitted data
It is the
responsibility of the
stations to ignore
data that is not
intended for them
(honor system)
LAN Technologies & Network
Protocols (Continued)

Switches reduce the amount of stations
that can view the same transmitted data
Tries to keep track of where stations are
located so it can direct data only to its
intended recipient
 If the switch does not know where to send
the data, it is forced to send it to everyone


Routers never broadcast data

Will only send data directly to a machine or
another router
Communication Protocols

Insecure communication protocols
FTP (file transfer protocol)
 HTTP (hyper-text transfer protocol)
 SMTP (simple mail transfer protocol)
 POP (post office protocol)
 IMAP (internet message access protocol)
 Telnet
 SNMP (simple network management
protocol)

Communication Protocols (Continued)

Secure communication protocols
FTPS- secure FTP
 HTTPS- secure HTTP
 No secure SMTP, POP, or IMAP



PGP (Pretty Good Privacy) - encrypts message
within SMTP, POP, or IMAP
SSH (secure shell) - answer to secure
Telnet
How Packet Analyzers Work






Can be installed on numerous operating
systems or can be dedicated hardware
Run under promiscuous mode
Can define filters to only capture wanted data
Converts binary data into a comprehensible
format
Can only convert clear text
Similar to a wire tap performed on phone lines
How Packet Analyzers Work
(Continued)

Ethereal (http://www.ethereal.com)
How Packet Analyzers Work
(Continued)

Iris (http://www.eeye.com/html/Products/Iris)
Who Uses Packet Analyzers

Network administrators
Troubleshoot and diagnose the network
 Intrusion detection


Network intruders
Gather sensitive data
 Monitor web browsing, email, or instant
message communication

Who Uses Packet Analyzers
(Continued)

The U.S. government
Crime prevention
 Carnivore

Can capture all network traffic of a particular
user or IP
 Installed at suspect’s ISP
 The USA PATRIOT Act has reduced restrictions
previously placed on Carnivore



U.S. attorney or state attorney general can order the
installation of Carnivore without going to court
Law enforcement agents can get blank warrants
What Packet Analyzers Can Run On
Can be installed on desktops, laptops,
and PDA’s (personal digital assistants)
 Can be purchased or downloaded for
free
 Can work on any type of network as long
as the hardware and software support it,
including wireless networks

What Packet Analyzers Can Run On
(Continued)

Small size of PDA’s
and palm-sized
laptops allow packet
analyzers to fit in a
shirt pocket
How to Detect Packet Analyzers

Packet analyzers do not transmit data, making
detection difficult
 Other network-based applications may give
away its presence, email, web browser, ARP
(address resolution protocol), DNS (domain
name service)
 Network administrator can ‘trick’ the network
analyzer to reply
 Specialized programs to detect network
analyzers

AntiSniff, CPM (check promiscuous mode), neped,
sentinel, and ifstatus
How to Protect Against Packet
Analyzers







Intrusion detection/prevention system
When possible, restrict network access by hardware
address
Disable unused ports
Disable port mirroring when not in use
Password protect networking devices (don’t use
default passwords)
Only use secure operating systems that prevent end
users from installing packet analyzers (Windows NTbased, Linux, or UNIX)
Virus scanners to detect malicious packet analyzing
software
End User Awareness

Know what information is sensitive and how to
make sure transmission methods are secure


Look at alternative methods of transmittal


Example: use HTTPS for online banking/shopping
Example: Using SSH instead of Telnet
Know network administrators can be using
packet analyzers to monitor you

Don’t do anything you shouldn’t at work!!!
Conclusion

When computers communicate over
networks, their communication is at risk
of being intercepted and monitored by
packet analyzers. A packet analyzer can
capture sensitive data, such as credit
card numbers, usernames, or
passwords. It is important to be
protected against network intrusions, as
well as be aware of how secure one’s
network communication is.
Questions