Graphics Programs Reference
In-Depth Information
With the headers decoded and separated into layers, the TCP/IP connec-
tion is much easier to understand. Notice which IP addresses are associated with
which MAC address. Also, notice how the sequence number in the two packets
from 192.168.42.1 (the first and last packet) increases by nine, since the first
packet contained nine bytes of actual data: 2887045283 - 2887045274 = 9.
This is used by the TCP protocol to make sure all of the data arrives in order,
since packets could be delayed for various reasons.
Despite all of the mechanisms built into the packet headers, the packets
are still visible to anyone on the same network segment. Protocols such as
FTP, POP3, and telnet transmit data without encryption. Even without the
assistance of a tool like dsniff, it's fairly trivial for an attacker sniffing the
network to find the usernames and passwords in these packets and use them
to compromise other systems. From a security perspective, this isn't too good,
so more intelligent switches provide switched network environments.
0x444
Active Sniffing
In a switched network environment , packets are only sent to the port they are
destined for, according to their destination MAC addresses. This requires
more intelligent hardware that can create and maintain a table associating
MAC addresses with certain ports, depending on which device is connected
to each port, as illustrated here.
The advantage of a switched environment is that devices are only sent
packets that are meant for them, so that promiscuous devices aren't able to
sniff any additional packets. But even in a switched environment, there are
clever ways to sniff other devices' packets; they just tend to be a bit more
complex. In order to find hacks like these, the details of the protocols must
be examined and then combined.
One important aspect of network communications that can be manip-
ulated for interesting effects is the source address. There's no provision in
these protocols to ensure that the source address in a packet really is the
address of the source machine. The act of forging a source address in a packet
is known as spoofing . The addition of spoofing to your bag of tricks greatly
increases the number of possible hacks, since most systems expect the source
address to be valid.
Port 1 00:00:00:AA:AA:AA
Port 2 00:00:00:BB:BB:BB
Port 3 00:00:00:CC:CC:CC
Switch
123
00:00:00:AA:AA:AA
00:00:00:BB:BB:BB
00:00:00:CC:CC:CC
Search WWH ::




Custom Search