Your SlideShare is downloading. ×
Java Abs   Packet Sniffer Tool
Java Abs   Packet Sniffer Tool
Java Abs   Packet Sniffer Tool
Java Abs   Packet Sniffer Tool
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Java Abs Packet Sniffer Tool

1,027

Published on

Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software …

Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, microcontroller projects, vlsi projects, dsp projects, free projects, project review, project report, project presentation, free source code, free project report, Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, final year java projects, final year asp.net projects, final year vb.net projects, vb.net projects, c# projects, final year c# projects, electrical projects, power electronics projects, motors and drives projects, robotics projects, ieee electrical projects, ieee power electronics projects, ieee robotics projects, power system projects, power system ieee projects, engineering projects, ieee engineering projects, engineering students projects, be projects, mca projects, mtech projects, btech projects, me projects, mtech projects, college projects, polytechnic projects, real time projects, ieee projects, non ieee projects, project presentation, project ppt, project pdf, project source code, project review, final year project, final year projects

Published in: Technology
1 Comment
0 Likes
Statistics
Notes
  • Be the first to like this

No Downloads
Views
Total Views
1,027
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
72
Comments
1
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. PACKET SNIFFER TOOL INTRODUCTION Today's networks are increasingly employing "switch" technology, preventing this technique from being as successful as in the past. It is still useful, though, as it is becoming increasingly easy to install remote sniffing programs on servers and routers, through which a lot of traffic flows. Packet sniffing is a form of wire-tap applied to computer networks instead of phone networks. It came into vogue with Ethernet, which is known as a "shared medium" network. This means that traffic on a segment passes by all hosts attached to that segment. Ethernet cards have a filter that prevents the host machine from seeing the traffic addressed to other stations. Sniffing programs turn off the filter, and thus see every ones traffic. Today's networks may already contain built-in sniffing modules. Most hubs support the RMON standard, which allow the intruder to sniff remotely using SNMP, which has weak authentication. Many corporations employ Network Associates "Distributed Sniffer Servers", which are set up with easy to guess passwords. Windows NT machines often have a "Network Monitoring Agent" installed, which again allows for remote sniffing. Packets sniffing is difficult to detect, but it can be done. But the difficulty of the solution means that in practice, it is rarely done. A dedicated device designed for the purpose of monitoring network traffic in order to recognize and decode certain packets of interest. A software package that enables a general-purpose computer to recognize and decode certain packets of interest. The packet sniffer is normally used by system administrators for network management and diagnostics. A program and/or device that monitors data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. On TCP/IP networks, where they sniff packets, they're often called packet sniffers. Packet sniffing is listening (with software) to the raw network device for packets that interest the user. When the user’s software sees a packet that fits certain criteria, it logs it to a file. The most common criteria for an interesting packet is one that contains words like "login" or "password." There are lots of existing packet sniffers, but all the existing ones have a demerit in terms of allowing only specific types of sniffers. We need a generic sniffer. Hence we are proposing to develop the same.
  • 2. AIM/OBJECTIVE OF THE SYSTEM The aim of the proposed system is to develop a JAVA based sniffer, which can handle the necessary packets and also analyze the network traffic. PROPOSED SYSTEM PROPOSED SOFTWARE REQUIREMENTS Operating system : Windows 2000 Server and Client Software : JSDK, Java 1.4 or higher Web server : Suitable web server/web logic/Tom Cat Database : Oracle 8i PROPOSED HARDWARE REQUIREMENTS Processor : P III 866 MHZ or above server and client RAM : 128 MB or above HDD : 80 GB Seagate or above FDD : 1.44 MB or above Monitor : Color or any compatible monitor CD Drive, Keyboard, Mouse, ATX cabinet PROPOSED SYSTEM DESCRIPTION "Packet Sniffer" is a utility that sniffs without modifying the network's packets in any way. By comparison, a firewall sees all of a computer's packet traffic as well, but it has the ability to block and drop any packets that its programming dictates. Packet sniffers merely watch, display, and log this traffic. One disturbingly powerful aspect of packet sniffers is their ability to place the hosting machine's network adapter into "promiscuous mode." Network adapters running in promiscuous mode receive not only the data directed to the machine hosting the sniffing software, but also ALL of the traffic on the physically connected local network. Packet sniffer acts as a spying tool. The popularity of packet sniffing stems from the fact that it sees everything. TYPICAL ITEMS SNIFFED INCLUDE SMTP, POP, IMAP traffic Allows intruder to read the actual e-mail. POP, IMAP, HTTP Basic, Telnet authentication
  • 3. Reads passwords off the wire in clear-text. SMB, NFS, FTP traffic Reads files of the wire. SQL databse Reads financial transactions and credit card numbers. Not only can sniffing read information that helps break into a system, it is an intrusion by itself because it reads the very files the intruder is interested in. This technique can be combined with active transmission for even more effective attacks. Its a cruel irony in information security that many of the features that make using computers easier or more efficient and the tools used to protect and secure the network can also be used to exploit and compromise the same computers and networks. This is the case with packet sniffing. A packet sniffer, sometimes referred to as a network monitor or network analyzer, can be used legitimately by a network or system administrator to monitor and troubleshoot network traffic. Using the information captured by the packet sniffer an administrator can identify erroneous packets and use the data to pinpoint bottlenecks and help maintain efficient network data transmission. In its simple form a packet sniffer simply captures all of the packets of data that pass through a given network interface. Typically, the packet sniffer would only capture packets that were intended for the machine in question. A packet sniffer can only capture packet information within a given subnet. So, its not possible for a malicious attacker to place a packet sniffer on their home ISP network and capture network traffic from inside our corporate network. In order to do so, the packet sniffer needs to be running on a computer that is inside the corporate network as well. PROPOSED SYSTEM FEATURES Captures the network traffic Analyzes the packets received Monitors the traffic Logs the data Classify the packets Bandwidth limitation
  • 4. PROPOSED SYSTEM MODULES CLIENT MODULES SERVER MODULES 1. CLIENT MANAGEMENT 1. SERVER MANAGEMENT Client login / Client registration Server authentication Client password change Server –client registration completion Authenticate Client password 2. SERVER CONNECTION change ESTABLISHMENT File transfer request 2. SERVER CONNECTION File transfer process ESTABLISHMENT File transfer response File transfer reception 3. PEER - PEER CONNECTION File transfer request 3. AUTHENTICATE PEER-PEER File transfer process CONNECTION 4. PORT SCANNER 4. PORT LISTENER 5. PACKET ANALYZER 5. PACKET SNIFFING Packet classification Packet type storage 6. PACKET FILTERING Set Packet filtering Bandwidth allocation and maintenance 7. BANDWIDTH ALLOCATION Log file maintenance 8. LOG FILE TRACKING 6. REPORTS

×