SlideShare a Scribd company logo
WELCOME
CARNIVORE
PRESENTED BY
SABNAM JEBIN .C
No:35
CONTENTS
 INTRODUCTION
 WHAT IS CARNIVORE
 WORKING OF A E-mail
 TYPES OF MODES
 PEN MODE OR TRAP AND TRACE MODE
 FULL-COLLECTION MODE
 FIXED IP FILTERING
 DYNAMIC IP FILTERING
• PROTOCOL FILTERING
• TEXT FILTERING
• PORT FILTERING
• E-mail ADDRESS FILTERING
• HOW CARNIVORE WORKS
• JAZZ DRIVE(SAVE AND STORE)
• IS IT NEW TECHNOLOGY
• DISADVANTAGES
• CONCLUSION
INTRODUCTION
• Development of the technology is natural.
• Technology can be used for as well as bad
purposes.
• As the technology grows human life becomes
simple and comfortable.
• But at the same time it also helps to anti-
social elements like criminals and terrorists.
Cntn…
• The evolution of cell-phone technology is
useful for both normal peoples , terrorist and
criminals at the same extent.
• For avoiding this types of crimes Low
Enforcement agencies were developed phone
tapping technology.
• Using this technology , we can find where he
is talking and can record what he is talking
without his knowledge.
Cntn…
• Today billions of business transactions are
taking place using E-mails.
• E-mails are so popular that we doubt whether
human life will go smoothly without E-mails.
• In cyber space , criminals and terrorists are
depending on E-mails for sending their
important information quickly to their
companions.
Cntn…
• While they using E-mails they are free from
afraid of phone tapping.
• E-mails initiated a lot of debate on matters of
security and ethics.
• As a solution for this problem , the
US.FBI(Federal bureau of investigation)
developed carnivore software.
What is carnivore
• Carnivore - “an animal that eats meat”
• The main characteristics of carnivore is , it can
smell meats wherever it is.
• FBI-federal bureau of investigation named this
software as “CARNIVORE” because it can
intercept and view the suspected e-mails and
internet traffic.
• Carnivore is a computer dependent
transaction tracking system.
cntn…
• Carnivore is an FBI assistance program that
helps ISP overcome technical difficulties
when complying with court orders.
• FBI connects the Carnivore installed computer to
ISP server.
• This computer compares every packet that travels
through the server with the filter that is settled in
it and stores if any packet is matched.
Cntn…
• While performing this process, it does not
disturb the Internet Traffic.
DATA
CARNIVORE
INTERNET
………………
………………
Working of a E-mail
• Click the send button composing
email cmptr breaks the data
small parts(uniform chunks)(“packets”).
• Packets divided -2 parts:
1 - CONTENT-data that is to be transmitted
2 - HEADER –source & destination IP address,
protocols:TCP/IP,FTP,SMTP etc…
Cntn…
• Packets serial number routed to the
global network. Destination check
(reached or not) reassembles the
message(depending on packet serial number).
Types of modes
• For collecting information carnivore uses two
types of methods , those are
1) Pen Mode or Trap And Trace Mode
2) Full Collection Mode
• We can set any one the mode depending on
our requirements.
Pen Mode or Trap And Trace Mode
• This mode almost looks like Caller Line
Identification method (CLI), which is used in
telephones.
• Using this CLI we can know the Caller number
( calling person’s telephone number).
• In the same way, Carnivore also finds from
which address the packet came and to whom
it was addressed etc..
Cntn…
• Apart from this details it can also finds the IP
addresses of the server and also the details of
the other servers that are participated in
routing mails.
• Using all this information we can find the
details of the computers those are
participated in FTP and HTTP sessions.
• FTP - File Transfer Protocol
and
• HTTP - Hyper Text Transfer
Protocol
Cntn…
• In general for scanning the e-mails we
use
Pen Mode or trap and trace mode.
Full Collection Mode
• In Full-collection Mode, apart from getting the
all information that is available in Pen Mode,
we can also read the total message.
• Whenever we have a doubt about a packet we
can change from Pen Mode to Full-collection
Mode to read the total message.
• Apart from the single word filtering method,
Carnivore provides some more methods.
• According to our needs we can set the Filtering
Method, which we want.
• Filtering Methods that are available in Carnivore:
• 1. Fixed IP Filtering
• 2. Dynamic IP Filtering
• 3. Protocol Filtering
• 4. Text Filtering
• 5. Port Filtering
• 6. E-mail Address Filtering
1:Fixed IP Filtering
• It is the simplest of all filtering methods
• In internet every server has an IP address from
0.0.0.0 to 255.255.255.255
• Giving an IP Address or a range of IP
Addresses to Carnivore we can scan the
outgoing as well an incoming data of those
servers.
• It is impossible to scan all the Internet Traffic
that runs in crores each day.
• So in general, FBI gives the suspected IP
Addresses and tries to scan the information
that runs through it.
• FBI follows this method giving a range to the
server.
2:Dynamic IP Filtering
• Today most of the computers are following
Dynamic IP Addressing system.
• Hence using Fixed IP Filtering is not useful, so
for this situation Dynamic IP Filtering is used.
• In this method, we have to give the Media
Access Code (MAC) of the computer from
which we are getting the information or E-mail
user name and the range of IP Addresses to
find the information.
3. Protocol Filtering
• In Internet, we are using different types of
protocols for data transmission. Using this
Protocol Filtering method, Carnivore finds the
information that is related to a particular
Protocol.
• We can get the information that uses UDP or
ICMP depending on some IP Addresses in Full-
collection mode or Pen mode.
4.Text Filtering
• In this method, Carnivore filters the packets
using the specified text string. For example, if
we have a doubt about a customer then
setting his user name as text string, we can
save a part or complete conversation or
Addresses.
• In the same way giving some doubtful works
to text string we can filter the packets that
contain these words.
5. Port Filtering
• Depending on several protocols, every server
contains a port number to transmit the data.
• These Port Numbers are same in all
computers.
• When we send the E-mail through the
Internet Account we set the port number 25
to the Outgoing mail (SMTP), 110 to the
Incoming mail (PoP3).
• These port numbers are implicitly taken by the
system.
• In the same way, HTTP has 80 as port number,
SLC has 995 as port numbers.
• Depending on the IP Address of a server, this
method scans only the data that travels
through a particular port without considering
the data that travels through other ports of
the server.
6. E-mail Address Filtering
• If we have doubt that any suspected information
is transmitting through a particular E-mail
address, then giving this E-mail address to the
Carnivore, we can record all SMTP and PoP3
information.
• Like this, using the Carnivore FBI is able to get any
information in Internet.
• Since this small application gives a wide authority
to the FBI on the Internet, people as well as
organizations are afraid and are protesting
against the Carnivore.
How carnivore works?
• “Ethernet Tap” - data is trapped from a hub or
switch that Is connected to the server to the
internet - for this they use a special
instrument.
• Ethernet Tap is connected to the
telephoneline which brings the data to the
ISP’s Hub.
• Other port of the Ethernet Tap is connected to
the Hub.
• Data transmits between these two ports as
normal as it transmits through the cable.
• Two ports are A and B.
A B
B A
• There are some arrangements at ports A and B
to copy the data and send them to the
Carnivore system.
Through the general cables
• Copied data from A B at port A or
B A at B.
• Send the data to another new ports.
• These two new ports can only receive the data
but could not send out the data. These type of
ports are called “READ-ONLY-TAPS”.
B
A
B
A
Jazz drive(save and store)
• The saving method is does not consist any
hard disk , floppy drive , ports , monitor and
keyboards etc…
• This consist only a small box.
• In this box , there have 2GB jazz drive to store
collecting data.
• Required data is stored in jazz disk , that fixed
in jazz drive.
Is it a new technology?
• Carnivore is not a new
technology.
• These types of several
sniffers are available in the
market.
DISADVANTAGES
•Trust
•Ease of access
•Loss of ISP control
•Procedural
• FBI officials argue that the Carnivore system
has become necessary because some smaller
ISP’s do not have the capability to provide the
data that law enforcement bodies need
quickly.
• It is like a Black Box.
• No Privacy.
• It can only intercept particular E-mail
CONCLUSION
• ISPs must have an open, auditable process such
that nobody even in the ISP’s organization can
read and E-mail of its subscribers.
• For national security, based on a clear
authorization, such tapping should be allowed
just as achieved and we will soon see foolproof
and balanced technical solutions for the same.
Carnivore
Carnivore

More Related Content

What's hot

Internet layer security protocol & IPsec
Internet layer security protocol & IPsecInternet layer security protocol & IPsec
Internet layer security protocol & IPsec
Kirti Ahirrao
 
Transporting voice by using IP
Transporting voice by using IPTransporting voice by using IP
Transporting voice by using IPMuhammad Jahangir
 
Skype and icq referat final - copy
Skype and icq referat   final - copySkype and icq referat   final - copy
Skype and icq referat final - copyMatej Kostroš
 
Presentation1
Presentation1Presentation1
Presentation1
Danesh Khandelwal
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Dân Chơi
 
Eap intro
Eap introEap intro
Eap intro
Aditya Mehta
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
Bint Javed
 
Tracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAATracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAA
IRJET Journal
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wireshark
IJARIIT
 
Internet relay chat (irc)
Internet relay chat (irc)Internet relay chat (irc)
Internet relay chat (irc)
Ryon Whyte
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
Rehan ali
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
ManishKumarH
 
what is Private and publis ip address
what is Private and publis ip addresswhat is Private and publis ip address
what is Private and publis ip address
Amit Kumar , Jaipur Engineers
 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
Pavan Kumar Sindgi
 
internet protocols
internet protocolsinternet protocols
internet protocols
CLIFFORD BRANDES
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
joebeone
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
Er. Rahul Jain
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
Jayesh Chauhan
 
Internet Relay Chat Forensics
Internet Relay Chat ForensicsInternet Relay Chat Forensics
Internet Relay Chat Forensics
IJSRD
 

What's hot (20)

Internet layer security protocol & IPsec
Internet layer security protocol & IPsecInternet layer security protocol & IPsec
Internet layer security protocol & IPsec
 
Transporting voice by using IP
Transporting voice by using IPTransporting voice by using IP
Transporting voice by using IP
 
Skype and icq referat final - copy
Skype and icq referat   final - copySkype and icq referat   final - copy
Skype and icq referat final - copy
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011
 
Eap intro
Eap introEap intro
Eap intro
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
Tracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAATracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAA
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wireshark
 
Internet relay chat (irc)
Internet relay chat (irc)Internet relay chat (irc)
Internet relay chat (irc)
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
what is Private and publis ip address
what is Private and publis ip addresswhat is Private and publis ip address
what is Private and publis ip address
 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
 
IP Address
IP AddressIP Address
IP Address
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Internet Relay Chat Forensics
Internet Relay Chat ForensicsInternet Relay Chat Forensics
Internet Relay Chat Forensics
 

Viewers also liked

Herbivore, carnivore and omnivore animals
Herbivore, carnivore and omnivore animalsHerbivore, carnivore and omnivore animals
Herbivore, carnivore and omnivore animalsPiliruce
 
Carnivores
CarnivoresCarnivores
Carnivores
noluv
 
Bluestacks ANDROID
Bluestacks ANDROIDBluestacks ANDROID
Bluestacks ANDROID
SUNIL KUMAR MAURYA
 
Carnivores herbivores omnivores with examples
Carnivores herbivores omnivores with examplesCarnivores herbivores omnivores with examples
Carnivores herbivores omnivores with examples
Verónica Estapé
 
Human Heart and its function
Human Heart and its functionHuman Heart and its function
The eating-habits-of-animals-ppt-teeth
The eating-habits-of-animals-ppt-teethThe eating-habits-of-animals-ppt-teeth
The eating-habits-of-animals-ppt-teeth
Verónica Estapé
 
Herbivores, carnivores and omnivores
Herbivores, carnivores and omnivoresHerbivores, carnivores and omnivores
Herbivores, carnivores and omnivores
CBMSUSARTE
 
Heart Structure and Function
Heart Structure and FunctionHeart Structure and Function
Heart Structure and Function
Faiq Bin Zahid
 
Simple Machines Presentation
Simple Machines PresentationSimple Machines Presentation
Simple Machines Presentation
mar_yoom
 
The Eating Habits Of Animals Ppt Project
The Eating Habits Of Animals Ppt ProjectThe Eating Habits Of Animals Ppt Project
The Eating Habits Of Animals Ppt ProjectStacia Herson
 
Heart Slides
Heart SlidesHeart Slides
Heart Slides
Satnam
 
Parts of the Heart and Their functions
Parts of the Heart and Their functionsParts of the Heart and Their functions
Parts of the Heart and Their functions
Dave Prodigo
 
Heart Presentation
Heart PresentationHeart Presentation
Heart Presentation
slapadula
 
Animals classification
Animals classificationAnimals classification
Animals classificationjoseklo
 

Viewers also liked (20)

Herbivore, carnivore and omnivore animals
Herbivore, carnivore and omnivore animalsHerbivore, carnivore and omnivore animals
Herbivore, carnivore and omnivore animals
 
Carnivores
CarnivoresCarnivores
Carnivores
 
Ejercicio 4 de word
Ejercicio 4 de wordEjercicio 4 de word
Ejercicio 4 de word
 
Bluestacks ANDROID
Bluestacks ANDROIDBluestacks ANDROID
Bluestacks ANDROID
 
Simple Machines
Simple MachinesSimple Machines
Simple Machines
 
Carnivores herbivores omnivores with examples
Carnivores herbivores omnivores with examplesCarnivores herbivores omnivores with examples
Carnivores herbivores omnivores with examples
 
Human Heart and its function
Human Heart and its functionHuman Heart and its function
Human Heart and its function
 
The eating-habits-of-animals-ppt-teeth
The eating-habits-of-animals-ppt-teethThe eating-habits-of-animals-ppt-teeth
The eating-habits-of-animals-ppt-teeth
 
Rover technology.ppt
Rover technology.pptRover technology.ppt
Rover technology.ppt
 
Herbivores, carnivores and omnivores
Herbivores, carnivores and omnivoresHerbivores, carnivores and omnivores
Herbivores, carnivores and omnivores
 
Heart Structure and Function
Heart Structure and FunctionHeart Structure and Function
Heart Structure and Function
 
Simple Machines Presentation
Simple Machines PresentationSimple Machines Presentation
Simple Machines Presentation
 
Heart Anatomy
Heart AnatomyHeart Anatomy
Heart Anatomy
 
The Eating Habits Of Animals Ppt Project
The Eating Habits Of Animals Ppt ProjectThe Eating Habits Of Animals Ppt Project
The Eating Habits Of Animals Ppt Project
 
Java ring Engg SEMINAR
Java ring Engg SEMINARJava ring Engg SEMINAR
Java ring Engg SEMINAR
 
Heart Slides
Heart SlidesHeart Slides
Heart Slides
 
Parts of the Heart and Their functions
Parts of the Heart and Their functionsParts of the Heart and Their functions
Parts of the Heart and Their functions
 
Heart Presentation
Heart PresentationHeart Presentation
Heart Presentation
 
Animals classification
Animals classificationAnimals classification
Animals classification
 
WHAT DO ANIMALS EAT?
WHAT DO ANIMALS EAT?WHAT DO ANIMALS EAT?
WHAT DO ANIMALS EAT?
 

Similar to Carnivore

ICMP
ICMP ICMP
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Boston Institute of Analytics
 
Network security
Network securityNetwork security
Network security
Nandini Raj
 
ManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical OverviewManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical Overview
ManageEngine, Zoho Corporation
 
The internet
The internetThe internet
The internet
joseph0914
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
Marcus Leaning
 
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
Amit Maisheri - Senior Analyst at eClerx
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
MahdiHasanSowrav
 
Packet capture in network security
Packet capture in network securityPacket capture in network security
Packet capture in network security
Chippy Thomas
 
How the internet works
How the internet worksHow the internet works
How the internet worksftcim
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
Tallat Satti
 
FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!
Aaron Lafferty
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
karthiksmart21
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
Priyanka Aash
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
Anpumathews
 
1.SNORT.pdf
1.SNORT.pdf1.SNORT.pdf
1.SNORT.pdf
AgusNursidik
 
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Your Botnet is My Botnet:  Analysis of a Botnet TakeoverYour Botnet is My Botnet:  Analysis of a Botnet Takeover
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Ahmed EL-KOSAIRY
 
Unit III
Unit IIIUnit III
Unit III
APARNA P
 

Similar to Carnivore (20)

ICMP
ICMP ICMP
ICMP
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
 
Network security
Network securityNetwork security
Network security
 
ManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical OverviewManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical Overview
 
The internet
The internetThe internet
The internet
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
 
Packet capture in network security
Packet capture in network securityPacket capture in network security
Packet capture in network security
 
How the internet works
How the internet worksHow the internet works
How the internet works
 
Dmk blackops2006
Dmk blackops2006Dmk blackops2006
Dmk blackops2006
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 
1.SNORT.pdf
1.SNORT.pdf1.SNORT.pdf
1.SNORT.pdf
 
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Your Botnet is My Botnet:  Analysis of a Botnet TakeoverYour Botnet is My Botnet:  Analysis of a Botnet Takeover
Your Botnet is My Botnet: Analysis of a Botnet Takeover
 
Unit III
Unit IIIUnit III
Unit III
 

Recently uploaded

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 

Recently uploaded (20)

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 

Carnivore

  • 3. CONTENTS  INTRODUCTION  WHAT IS CARNIVORE  WORKING OF A E-mail  TYPES OF MODES  PEN MODE OR TRAP AND TRACE MODE  FULL-COLLECTION MODE  FIXED IP FILTERING  DYNAMIC IP FILTERING
  • 4. • PROTOCOL FILTERING • TEXT FILTERING • PORT FILTERING • E-mail ADDRESS FILTERING • HOW CARNIVORE WORKS • JAZZ DRIVE(SAVE AND STORE) • IS IT NEW TECHNOLOGY • DISADVANTAGES • CONCLUSION
  • 5. INTRODUCTION • Development of the technology is natural. • Technology can be used for as well as bad purposes. • As the technology grows human life becomes simple and comfortable. • But at the same time it also helps to anti- social elements like criminals and terrorists.
  • 6. Cntn… • The evolution of cell-phone technology is useful for both normal peoples , terrorist and criminals at the same extent. • For avoiding this types of crimes Low Enforcement agencies were developed phone tapping technology. • Using this technology , we can find where he is talking and can record what he is talking without his knowledge.
  • 7. Cntn… • Today billions of business transactions are taking place using E-mails. • E-mails are so popular that we doubt whether human life will go smoothly without E-mails. • In cyber space , criminals and terrorists are depending on E-mails for sending their important information quickly to their companions.
  • 8. Cntn… • While they using E-mails they are free from afraid of phone tapping. • E-mails initiated a lot of debate on matters of security and ethics. • As a solution for this problem , the US.FBI(Federal bureau of investigation) developed carnivore software.
  • 9. What is carnivore • Carnivore - “an animal that eats meat” • The main characteristics of carnivore is , it can smell meats wherever it is. • FBI-federal bureau of investigation named this software as “CARNIVORE” because it can intercept and view the suspected e-mails and internet traffic. • Carnivore is a computer dependent transaction tracking system.
  • 10. cntn… • Carnivore is an FBI assistance program that helps ISP overcome technical difficulties when complying with court orders. • FBI connects the Carnivore installed computer to ISP server. • This computer compares every packet that travels through the server with the filter that is settled in it and stores if any packet is matched.
  • 11.
  • 12. Cntn… • While performing this process, it does not disturb the Internet Traffic. DATA CARNIVORE INTERNET ……………… ………………
  • 13. Working of a E-mail • Click the send button composing email cmptr breaks the data small parts(uniform chunks)(“packets”). • Packets divided -2 parts: 1 - CONTENT-data that is to be transmitted 2 - HEADER –source & destination IP address, protocols:TCP/IP,FTP,SMTP etc…
  • 14. Cntn… • Packets serial number routed to the global network. Destination check (reached or not) reassembles the message(depending on packet serial number).
  • 15. Types of modes • For collecting information carnivore uses two types of methods , those are 1) Pen Mode or Trap And Trace Mode 2) Full Collection Mode • We can set any one the mode depending on our requirements.
  • 16. Pen Mode or Trap And Trace Mode • This mode almost looks like Caller Line Identification method (CLI), which is used in telephones. • Using this CLI we can know the Caller number ( calling person’s telephone number). • In the same way, Carnivore also finds from which address the packet came and to whom it was addressed etc..
  • 17. Cntn… • Apart from this details it can also finds the IP addresses of the server and also the details of the other servers that are participated in routing mails. • Using all this information we can find the details of the computers those are participated in FTP and HTTP sessions.
  • 18. • FTP - File Transfer Protocol and • HTTP - Hyper Text Transfer Protocol
  • 19. Cntn… • In general for scanning the e-mails we use Pen Mode or trap and trace mode.
  • 20. Full Collection Mode • In Full-collection Mode, apart from getting the all information that is available in Pen Mode, we can also read the total message. • Whenever we have a doubt about a packet we can change from Pen Mode to Full-collection Mode to read the total message. • Apart from the single word filtering method, Carnivore provides some more methods.
  • 21. • According to our needs we can set the Filtering Method, which we want. • Filtering Methods that are available in Carnivore: • 1. Fixed IP Filtering • 2. Dynamic IP Filtering • 3. Protocol Filtering • 4. Text Filtering • 5. Port Filtering • 6. E-mail Address Filtering
  • 22. 1:Fixed IP Filtering • It is the simplest of all filtering methods • In internet every server has an IP address from 0.0.0.0 to 255.255.255.255 • Giving an IP Address or a range of IP Addresses to Carnivore we can scan the outgoing as well an incoming data of those servers.
  • 23. • It is impossible to scan all the Internet Traffic that runs in crores each day. • So in general, FBI gives the suspected IP Addresses and tries to scan the information that runs through it. • FBI follows this method giving a range to the server.
  • 24. 2:Dynamic IP Filtering • Today most of the computers are following Dynamic IP Addressing system. • Hence using Fixed IP Filtering is not useful, so for this situation Dynamic IP Filtering is used. • In this method, we have to give the Media Access Code (MAC) of the computer from which we are getting the information or E-mail user name and the range of IP Addresses to find the information.
  • 25. 3. Protocol Filtering • In Internet, we are using different types of protocols for data transmission. Using this Protocol Filtering method, Carnivore finds the information that is related to a particular Protocol. • We can get the information that uses UDP or ICMP depending on some IP Addresses in Full- collection mode or Pen mode.
  • 26. 4.Text Filtering • In this method, Carnivore filters the packets using the specified text string. For example, if we have a doubt about a customer then setting his user name as text string, we can save a part or complete conversation or Addresses. • In the same way giving some doubtful works to text string we can filter the packets that contain these words.
  • 27. 5. Port Filtering • Depending on several protocols, every server contains a port number to transmit the data. • These Port Numbers are same in all computers. • When we send the E-mail through the Internet Account we set the port number 25 to the Outgoing mail (SMTP), 110 to the Incoming mail (PoP3).
  • 28. • These port numbers are implicitly taken by the system. • In the same way, HTTP has 80 as port number, SLC has 995 as port numbers. • Depending on the IP Address of a server, this method scans only the data that travels through a particular port without considering the data that travels through other ports of the server.
  • 29. 6. E-mail Address Filtering • If we have doubt that any suspected information is transmitting through a particular E-mail address, then giving this E-mail address to the Carnivore, we can record all SMTP and PoP3 information. • Like this, using the Carnivore FBI is able to get any information in Internet. • Since this small application gives a wide authority to the FBI on the Internet, people as well as organizations are afraid and are protesting against the Carnivore.
  • 31. • “Ethernet Tap” - data is trapped from a hub or switch that Is connected to the server to the internet - for this they use a special instrument. • Ethernet Tap is connected to the telephoneline which brings the data to the ISP’s Hub. • Other port of the Ethernet Tap is connected to the Hub.
  • 32. • Data transmits between these two ports as normal as it transmits through the cable. • Two ports are A and B. A B B A • There are some arrangements at ports A and B to copy the data and send them to the Carnivore system. Through the general cables
  • 33. • Copied data from A B at port A or B A at B. • Send the data to another new ports. • These two new ports can only receive the data but could not send out the data. These type of ports are called “READ-ONLY-TAPS”. B A B A
  • 34.
  • 35. Jazz drive(save and store) • The saving method is does not consist any hard disk , floppy drive , ports , monitor and keyboards etc… • This consist only a small box. • In this box , there have 2GB jazz drive to store collecting data. • Required data is stored in jazz disk , that fixed in jazz drive.
  • 36.
  • 37. Is it a new technology? • Carnivore is not a new technology. • These types of several sniffers are available in the market.
  • 38. DISADVANTAGES •Trust •Ease of access •Loss of ISP control •Procedural
  • 39. • FBI officials argue that the Carnivore system has become necessary because some smaller ISP’s do not have the capability to provide the data that law enforcement bodies need quickly. • It is like a Black Box. • No Privacy. • It can only intercept particular E-mail
  • 40. CONCLUSION • ISPs must have an open, auditable process such that nobody even in the ISP’s organization can read and E-mail of its subscribers. • For national security, based on a clear authorization, such tapping should be allowed just as achieved and we will soon see foolproof and balanced technical solutions for the same.