SlideShare a Scribd company logo
1 of 4
Download to read offline
PACKET SNIFFER TOOL
INTRODUCTION
Today's networks are increasingly employing "switch" technology, preventing this
technique from being as successful as in the past. It is still useful, though, as it is
becoming increasingly easy to install remote sniffing programs on servers and
routers, through which a lot of traffic flows.
Packet sniffing is a form of wire-tap applied to computer networks instead of phone
networks. It came into vogue with Ethernet, which is known as a "shared medium"
network.
This means that traffic on a segment passes by all hosts attached to that segment.
Ethernet cards have a filter that prevents the host machine from seeing the traffic
addressed to other stations. Sniffing programs turn off the filter, and thus see
every ones traffic.
Today's networks may already contain built-in sniffing modules. Most hubs support
the RMON standard, which allow the intruder to sniff remotely using SNMP, which
has weak authentication.
Many corporations employ Network Associates "Distributed Sniffer Servers", which
are set up with easy to guess passwords. Windows NT machines often have a
"Network Monitoring Agent" installed, which again allows for remote sniffing.
Packets sniffing is difficult to detect, but it can be done. But the difficulty of the
solution means that in practice, it is rarely done.
A dedicated device designed for the purpose of monitoring network traffic in order
to recognize and decode certain packets of interest.
A software package that enables a general-purpose computer to recognize and
decode certain packets of interest. The packet sniffer is normally used by system
administrators for network management and diagnostics.
A program and/or device that monitors data traveling over a network. Sniffers can
be used both for legitimate network management functions and for stealing
information off a network.
Unauthorized sniffers can be extremely dangerous to a network's security because
they are virtually impossible to detect and can be inserted almost anywhere. On
TCP/IP networks, where they sniff packets, they're often called packet sniffers.
Packet sniffing is listening (with software) to the raw network device for packets
that interest the user. When the user’s software sees a packet that fits certain
criteria, it logs it to a file. The most common criteria for an interesting packet is one
that contains words like "login" or "password."
There are lots of existing packet sniffers, but all the existing ones have a demerit in
terms of allowing only specific types of sniffers. We need a generic sniffer. Hence
we are proposing to develop the same.
AIM/OBJECTIVE OF THE SYSTEM
The aim of the proposed system is to develop a JAVA based sniffer,
which can handle the necessary packets and also analyze the network
traffic.

                            PROPOSED SYSTEM
PROPOSED SOFTWARE REQUIREMENTS
Operating system :     Windows 2000 Server and Client
Software           :   JSDK, Java 1.4 or higher
Web server         :   Suitable web server/web logic/Tom Cat
Database           :   Oracle 8i


PROPOSED HARDWARE REQUIREMENTS
Processor      :   P III 866 MHZ or above server and client
RAM            :   128 MB or above
HDD            :   80 GB Seagate or above
FDD            :   1.44 MB or above
Monitor        :   Color or any compatible monitor
CD Drive, Keyboard, Mouse, ATX cabinet


PROPOSED SYSTEM DESCRIPTION
"Packet Sniffer" is a utility that sniffs without modifying the network's packets in
any way. By comparison, a firewall sees all of a computer's packet traffic as well,
but it has the ability to block and drop any packets that its programming dictates.
Packet sniffers merely watch, display, and log this traffic.
One disturbingly powerful aspect of packet sniffers is their ability to place the
hosting machine's network adapter into "promiscuous mode."
Network adapters running in promiscuous mode receive not only the data directed
to the machine hosting the sniffing software, but also ALL of the traffic on the
physically connected local network. Packet sniffer acts as a spying tool.

       The popularity of packet sniffing stems from the fact that it
                            sees everything.

TYPICAL ITEMS SNIFFED INCLUDE
   SMTP, POP, IMAP traffic
   Allows intruder to read the actual e-mail.
   POP, IMAP, HTTP Basic, Telnet authentication
Reads passwords off the wire in clear-text.
   SMB, NFS, FTP traffic
   Reads files of the wire.
   SQL databse
   Reads financial transactions and credit card numbers.

Not only can sniffing read information that helps break into a system, it is an
intrusion by itself because it reads the very files the intruder is interested in.
This technique can be combined with active transmission for even more effective
attacks.
Its a cruel irony in information security that many of the features that make using
computers easier or more efficient and the tools used to protect and secure the
network can also be used to exploit and compromise the same computers and
networks. This is the case with packet sniffing.
A packet sniffer, sometimes referred to as a network monitor or network analyzer,
can be used legitimately by a network or system administrator to monitor and
troubleshoot network traffic.
Using the information captured by the packet sniffer an administrator can identify
erroneous packets and use the data to pinpoint bottlenecks and help maintain
efficient network data transmission.
In its simple form a packet sniffer simply captures all of the packets of data that
pass through a given network interface.
Typically, the packet sniffer would only capture packets that were intended for the
machine in question.
A packet sniffer can only capture packet information within a given subnet. So, its
not possible for a malicious attacker to place a packet sniffer on their home ISP
network and capture network traffic from inside our corporate network.
In order to do so, the packet sniffer needs to be running on a computer that is
inside the corporate network as well.


                     PROPOSED SYSTEM FEATURES
   Captures the network traffic
   Analyzes the packets received
   Monitors the traffic
   Logs the data
   Classify the packets
   Bandwidth limitation
PROPOSED SYSTEM MODULES

     CLIENT MODULES                              SERVER MODULES

1. CLIENT MANAGEMENT                     1. SERVER MANAGEMENT
    Client login / Client registration        Server authentication
    Client password change                    Server    –client   registration
                                              completion
                                              Authenticate Client password
2. SERVER CONNECTION                          change
   ESTABLISHMENT
    File transfer request                2. SERVER CONNECTION
    File transfer process                   ESTABLISHMENT
                                               File transfer response
                                               File transfer reception
3. PEER - PEER CONNECTION
    File transfer request
                                         3. AUTHENTICATE PEER-PEER
    File transfer process                   CONNECTION

                                         4. PORT SCANNER
4. PORT LISTENER
                                         5. PACKET ANALYZER
5. PACKET SNIFFING                             Packet classification
                                               Packet type storage
6. PACKET FILTERING                            Set Packet filtering
                                               Bandwidth      allocation   and
                                               maintenance
7. BANDWIDTH ALLOCATION
                                               Log file maintenance

8. LOG FILE TRACKING                     6. REPORTS

More Related Content

More from ncct

Distance Protection
Distance ProtectionDistance Protection
Distance Protectionncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammerncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projectsncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects Bncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S Pncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C Tncct
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projectsncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computingncct
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projectsncct
 
A S P
A S PA S P
A S Pncct
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S Pncct
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...ncct
 
Ieee Projects Ieeeprojects
Ieee Projects IeeeprojectsIeee Projects Ieeeprojects
Ieee Projects Ieeeprojectsncct
 
A S P
A S PA S P
A S Pncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects Bncct
 

More from ncct (20)

Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 
A S P
A S PA S P
A S P
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S P
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
 
Ieee Projects Ieeeprojects
Ieee Projects IeeeprojectsIeee Projects Ieeeprojects
Ieee Projects Ieeeprojects
 
A S P
A S PA S P
A S P
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 

Recently uploaded

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Recently uploaded (20)

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Java Abs Packet Sniffer Tool

  • 1. PACKET SNIFFER TOOL INTRODUCTION Today's networks are increasingly employing "switch" technology, preventing this technique from being as successful as in the past. It is still useful, though, as it is becoming increasingly easy to install remote sniffing programs on servers and routers, through which a lot of traffic flows. Packet sniffing is a form of wire-tap applied to computer networks instead of phone networks. It came into vogue with Ethernet, which is known as a "shared medium" network. This means that traffic on a segment passes by all hosts attached to that segment. Ethernet cards have a filter that prevents the host machine from seeing the traffic addressed to other stations. Sniffing programs turn off the filter, and thus see every ones traffic. Today's networks may already contain built-in sniffing modules. Most hubs support the RMON standard, which allow the intruder to sniff remotely using SNMP, which has weak authentication. Many corporations employ Network Associates "Distributed Sniffer Servers", which are set up with easy to guess passwords. Windows NT machines often have a "Network Monitoring Agent" installed, which again allows for remote sniffing. Packets sniffing is difficult to detect, but it can be done. But the difficulty of the solution means that in practice, it is rarely done. A dedicated device designed for the purpose of monitoring network traffic in order to recognize and decode certain packets of interest. A software package that enables a general-purpose computer to recognize and decode certain packets of interest. The packet sniffer is normally used by system administrators for network management and diagnostics. A program and/or device that monitors data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. On TCP/IP networks, where they sniff packets, they're often called packet sniffers. Packet sniffing is listening (with software) to the raw network device for packets that interest the user. When the user’s software sees a packet that fits certain criteria, it logs it to a file. The most common criteria for an interesting packet is one that contains words like "login" or "password." There are lots of existing packet sniffers, but all the existing ones have a demerit in terms of allowing only specific types of sniffers. We need a generic sniffer. Hence we are proposing to develop the same.
  • 2. AIM/OBJECTIVE OF THE SYSTEM The aim of the proposed system is to develop a JAVA based sniffer, which can handle the necessary packets and also analyze the network traffic. PROPOSED SYSTEM PROPOSED SOFTWARE REQUIREMENTS Operating system : Windows 2000 Server and Client Software : JSDK, Java 1.4 or higher Web server : Suitable web server/web logic/Tom Cat Database : Oracle 8i PROPOSED HARDWARE REQUIREMENTS Processor : P III 866 MHZ or above server and client RAM : 128 MB or above HDD : 80 GB Seagate or above FDD : 1.44 MB or above Monitor : Color or any compatible monitor CD Drive, Keyboard, Mouse, ATX cabinet PROPOSED SYSTEM DESCRIPTION "Packet Sniffer" is a utility that sniffs without modifying the network's packets in any way. By comparison, a firewall sees all of a computer's packet traffic as well, but it has the ability to block and drop any packets that its programming dictates. Packet sniffers merely watch, display, and log this traffic. One disturbingly powerful aspect of packet sniffers is their ability to place the hosting machine's network adapter into "promiscuous mode." Network adapters running in promiscuous mode receive not only the data directed to the machine hosting the sniffing software, but also ALL of the traffic on the physically connected local network. Packet sniffer acts as a spying tool. The popularity of packet sniffing stems from the fact that it sees everything. TYPICAL ITEMS SNIFFED INCLUDE SMTP, POP, IMAP traffic Allows intruder to read the actual e-mail. POP, IMAP, HTTP Basic, Telnet authentication
  • 3. Reads passwords off the wire in clear-text. SMB, NFS, FTP traffic Reads files of the wire. SQL databse Reads financial transactions and credit card numbers. Not only can sniffing read information that helps break into a system, it is an intrusion by itself because it reads the very files the intruder is interested in. This technique can be combined with active transmission for even more effective attacks. Its a cruel irony in information security that many of the features that make using computers easier or more efficient and the tools used to protect and secure the network can also be used to exploit and compromise the same computers and networks. This is the case with packet sniffing. A packet sniffer, sometimes referred to as a network monitor or network analyzer, can be used legitimately by a network or system administrator to monitor and troubleshoot network traffic. Using the information captured by the packet sniffer an administrator can identify erroneous packets and use the data to pinpoint bottlenecks and help maintain efficient network data transmission. In its simple form a packet sniffer simply captures all of the packets of data that pass through a given network interface. Typically, the packet sniffer would only capture packets that were intended for the machine in question. A packet sniffer can only capture packet information within a given subnet. So, its not possible for a malicious attacker to place a packet sniffer on their home ISP network and capture network traffic from inside our corporate network. In order to do so, the packet sniffer needs to be running on a computer that is inside the corporate network as well. PROPOSED SYSTEM FEATURES Captures the network traffic Analyzes the packets received Monitors the traffic Logs the data Classify the packets Bandwidth limitation
  • 4. PROPOSED SYSTEM MODULES CLIENT MODULES SERVER MODULES 1. CLIENT MANAGEMENT 1. SERVER MANAGEMENT Client login / Client registration Server authentication Client password change Server –client registration completion Authenticate Client password 2. SERVER CONNECTION change ESTABLISHMENT File transfer request 2. SERVER CONNECTION File transfer process ESTABLISHMENT File transfer response File transfer reception 3. PEER - PEER CONNECTION File transfer request 3. AUTHENTICATE PEER-PEER File transfer process CONNECTION 4. PORT SCANNER 4. PORT LISTENER 5. PACKET ANALYZER 5. PACKET SNIFFING Packet classification Packet type storage 6. PACKET FILTERING Set Packet filtering Bandwidth allocation and maintenance 7. BANDWIDTH ALLOCATION Log file maintenance 8. LOG FILE TRACKING 6. REPORTS