Packet sniffers

5,784 views

Published on

Good one for presentation.

Published in: Education
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
5,784
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
405
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide
  • Applications:
  • Packet sniffer softwares available in the market are :1.Net stumbler2.Wire shark3.Packet sniffer
  • Lets be specific about this software and observe the process ……….
  • Now its time for us to have a glance at the sample C code of a packet sniffer:
  • Thank you!!!
  • Packet sniffers

    1. 1. Packet Sniffers Prepared By:- M.Ravi Teja Reddy CSE -2 MVSR engineering college
    2. 2. Index Introduction Types of environment Varieties of packet sniffers What is it used for Components Working Applications Disadvantages Types of softwares available 2
    3. 3. INTRODUCTION Router A Host B Host A Router B A packet sniffer is a software application that uses a network adapter card in promiscuous mode to capture all network packets. The feature of packet sniffers is:-  Packet sniffers exploit information passed in clear text.  Protocols that pass information in the clear include the following:  Telnet  FTP  SNMP  POP
    4. 4. Varieties of packet sniffers• Today, sniffers exist in two broad varieties:• The first is a stand-alone product incorporated into a portable computer• The second is part of a larger package of network- monitoring hardware and software• Basically Commercial packet sniffers are used to help maintain networks.• Underground packet sniffers are used to break into computers. •3/16/2013
    5. 5. • Used to debug communication between a client and a server.• Help in identifying who is communicating with whom and what data is sent and received over the network.• Used in monitor how a network as used and also used to monitor network users.• Used to make network more secure - In order to come through to your network, it must pass through the packet sniffer. 3/16/2013
    6. 6. • Used in identify network problems before they becomeserious. 3/16/2013
    7. 7. • This lets the packet sniffers see all data trafficon the network segment to which theyreattached• For this to happen sniffer must be locatedwithin the same network block (or net of trust)as the network it is intended to sniff, sniffercould be placed anywhere within that block
    8. 8. Applications:1. Analysing the band with used.2. Determining the hackers if any are tryingto access .3. Know the ip address of different systemsconnected to your system4. Analyse the traffic flowing through thenetwork
    9. 9. Disadvantages:-• Configuring your network device to read all networkpackets that arrive which might contain trojan horses, youmight also open doors to allow intruders access to yourconfidential data and network files. 3/16/2013
    10. 10. Packet sniffer softwares available in the market are : 1. Wire shark 2. Net stumbler 3.Packet sniffer4. Microsoft Network Monitor etc..
    11. 11. Wire shark :•Wire shark is the worlds foremost network protocolanalyzer.• It is the de facto (and often de jure) standard acrossmany industries and educational institutions.• It lets you capture the traffic and browse it on acomputer network.• Lets be specific about this software andobserve the process ………. •17
    12. 12. Features of Wireshark:• Available for UNIX and Windows.• Capture live packet data from a network interface.• Display packets with very detailed protocol information.• Saves captured packet data.• Import and Export packet data from and to a lot of othercapture programs. 3/16/2013
    13. 13. • Filter packets on many criteria.• Search for packets on many criteria• Colorize packet display based on filters.• Create various statistics 3/16/2013
    14. 14. Wireshark does not provide:• It will not warn you when someone does strange thingson your network that he/she isnt allowed to do. Butwireshark might help you figure out what is really goingon.• Wireshark will not manipulate things on the network, itwill only "measure" things from it. 3/16/2013
    15. 15. Now its time for us to have a glance at the sample Ccode of a packet sniffer Screen shots:
    16. 16. 25
    17. 17. References:-www.Packet-sniffer.netwww.wireshark.orgwww.Wikipedia.orgAnd many more… 26
    18. 18. Thank you!!!Any questions? 27

    ×