Network Protocol Analyzer


Published on

Published in: Education, Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Network Protocol Analyzer

  1. 1. NETWORK PROTOCOL ANALYZER Raksha.J-IMS07IS078 Sahana.P.Shankar-IMS07IS086 Sai Janaki Tejaswi P-IMS07IS087 Shruthi Raghavan-IMS07IS096
  2. 2. AGENDA <ul><li>What is network protocol analyzer. </li></ul><ul><li>Uses of network protocol analyzer. </li></ul><ul><li>Tools available. </li></ul><ul><li>Protocols used on the network. </li></ul><ul><li>About the tool Softperfect. </li></ul><ul><li>Advantages of this tool. </li></ul><ul><li>Implementation using Softperfect. </li></ul><ul><li>References. </li></ul><ul><li>Acknowledgement. </li></ul>
  3. 3. What is Network Protocol Analyzer? <ul><li>The packet analyzer (also known as a network analyzer, protocol analyzer or sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. </li></ul><ul><li>Network sniffer is a program and/or device that monitors data travelling over a network. Network sniffers can be used both for legitimate network management functions and for stealing information off a network. </li></ul>
  4. 4. USES <ul><li>Analyze network problems. </li></ul><ul><li>Detect network intrusion attempts. </li></ul><ul><li>Gain information for effecting a network intrusion. </li></ul><ul><li>Monitor network usage. </li></ul><ul><li>Gather and report network statistics. </li></ul><ul><li>Filter suspect content from network traffic. </li></ul><ul><li>Spy on other network users and collect sensitive information such as passwords (depending on any content encryption methods which may be in use) </li></ul><ul><li>Debug client/server communications. </li></ul><ul><li>Debug network protocol implementations . </li></ul>
  5. 5. Protocols used on network Critical Essential Essential Essential Importance TCP,UDP ARP IP,ICMP ethernet, SLIP, PPP, Token Ring, ARCnet Names of protocols Controls the management of service between computers. Communicates between layers to allow one layer to get information to support another layer Manages movement of messages and reports errors. Allows messages to be packaged and sent between physical locations. What it does
  6. 6. Contd…… Provides direct services to the user. Enhances network management and increases functionality DNS provides address to name translation for locations and network cards. RPC allows remote computer to perform functions on other computers. Useful Advanced Important FTP, TFTP, SMTP, Telnet, NFS, ping, Rlogin RARP, BOOTP, DHCP, IGMP, SNMP,RIP, OSPF, BGP, CIDR DNS,RPC Names of protocols What it does Importance
  7. 7. TOOLS <ul><li>Wireshark : Wireshark (formerly known as Ethereal) is a fantastic open source network protocol analyzer for Unix and Windows. </li></ul><ul><li>Snort : This is network intrusion detection and prevention system excels at traffic analysis on IP networks. </li></ul><ul><li>Netcat : This simple utility reads and writes data across TCP or UDP network connections. </li></ul><ul><li>Tcpdump : Tcpdump is the IP sniffer used before Ethereal (Wireshark) came on the scene, and many of us continue to use it frequently. </li></ul><ul><li>Netfilter : Netfilter is a powerful packet filter implemented in the standard Linux kernel. </li></ul><ul><li>Capsa : Capsa Network Analyzer is an all-in-one & easy-to-use Ethernet network protocol analyzer for Windows platforms. </li></ul><ul><li>The other tools available are Carnivore,dSniff,Clarified Analyzer,SoftPerfect,Snoop,NetScout etc; </li></ul>
  8. 8. SoftPerfect Tool <ul><li>It is an advanced, professional tool for analyzing, debugging, maintaining and monitoring local networks and Internet connections. </li></ul><ul><li>It captures the data passing through your dial-up connection or network Ethernet card. </li></ul><ul><li>It is a useful tool for network administrators, security specialists, network application developers,etc. </li></ul>
  9. 9. Advantages of SoftPerfect <ul><li>It allows you to defragment and reassemble network packets into streams. </li></ul><ul><li>The program can easily analyze network traffic based on a number of different Internet protocols . </li></ul><ul><li>It also features a packet builder. </li></ul><ul><li>It can be used to discard all network traffic except the specific traffic patterns you wish to analyze. </li></ul><ul><li>It features full decoding of the following low level protocols: AH, ARP, ESP, ICMP, ICMPv6, IGMP, IP, IPv6, IPX, LLC, MSG, REVARP, RIP, SAP, SER, SNAP, SPX, TCP and UDP. </li></ul><ul><li>It has a flexible system of traffic filtering. </li></ul>
  10. 10. References <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>
  11. 11. Acknowledgement <ul><li>We would like to thank our faculty Siddesh sir and Manishekhar sir. </li></ul><ul><li>We would also like to thank our friend Mohammed Reza who helped us out in the project. </li></ul>