background image

your mouse.   

Note: Airscanner Mobile Sniffer™ is based in part on Winpcap, so you will not have 

to install Winpcap separately as Airscanner Mobile Sniffer™  will install the necessary 
parts for you.  However, you will need to install it on your PC  if you plan to use Ethereal 
for advanced desktop based post-data capture analysis (highly recommended). 

  
Installation of a sniffer on Linux usually requires no extra drivers other than those 

required for normal operation. The only exceptions to this are wireless sniffers, which 
could require patches or a special driver. Ensure you read the sniffer’s documentation 
before installation to avoid hours of frustration. 

  

2.1.4 Promiscuous Mode 

When a network card is manufactured, it is assigned a unique identifier known as a 

Media Access Control (MAC) address. Since this address is supposed to be unique, is 
serves as one of the fundamental methods by which data is transmitted over a network. 
While there are many other communication protocols that sit on top of the MAC address 
to help with data flow, the MAC address is used in the first and last leg of the 
transmission process. It is important to understand the importance of the MAC address, 
because it indirectly affects what data a sniffer can access.  

  
When a network card is operating normally, it actually scans each packet of data 

traveling over the network to see if any of the data is labeled with its MAC address. If 
there is a match, the data is passed up to the next layer in the protocol stack, and 
ultimately to the program to which it was sent. However, if the packet is not addressed to 
the NIC, it will be ignored.  

  
Since the sniffer software actually operates above the hardware layer of the 

communication stack, it will only receive data that was sent to the computer on which it 
is operating. In other words, the sniffer will only see local traffic. While this level of 
access can be helpful in some situations, the limited access will restrict most 
troubleshooting efforts. However, this is where promiscuous mode comes into play.  

  
When a network card is placed in promiscuous mode, it will accept ALL data passed 

on the wire to which it is connected, regardless of any MAC address. However, there are 
still some obstacles a sniffer must overcome to gain access to network traffic. This 
includes additional support for wireless data, which uses radio waves to pass data, and 
limitations due to networking technology. 

  

2.2 Switches and Hubs 

Within any local area network you will find network hubs and/or switches. These 

devices are very similar in appearance, and on the surface perform the same duties. 
However, once you look at how these devices work, you will quickly see that they are 
inherently different devices.  

  
A hub is a very simple 

passive

 device that receives data in on one port and distributes 

it to all the other ports. It does not examine or care what data passes through it, nor does 

Summary of Contents for Mobile Sniffer

Page 1: ...Airscanner Mobile Sniffer For Windows Mobile Pocket PC Technical Whitepaper and User s Guide Level ___ Beginner _x_ Intermediate _x_ Advanced ___ Expert Estimated Reading Time 60 minutes...

Page 2: ...r TM Mobile Sniffer packs the power of a full scale sniffer into an application for portable devices Once your Windows Mobile device is linked to the network Airscanner TM Mobile Sniffer monitors all...

Page 3: ...006 Airscanner Corp Please ask permission before redistributing this software or user s manual Version History Version 1 0 released April 30 2003 Version 1 02 released May 7 2003 Version 2 0 released...

Page 4: ...ace or as part of a complex and very expensive hardware device e g 40 000 GTX Multi protocol analyzer that can handle multiple network lines and GBs of data Though it is just a tool it like many other...

Page 5: ...his is because there are several major types of wireless network cards WNICs available on the market Fortunately these have become more standardized across OEMs especially now that built in WiFi cards...

Page 6: ...etwork to see if any of the data is labeled with its MAC address If there is a match the data is passed up to the next layer in the protocol stack and ultimately to the program to which it was sent Ho...

Page 7: ...access to it 2 3 ARP Spoofing As we have previously discussed the existence of a switch in a network is a serious obstacle to a sniffer Due to a MAC IP table traffic from one NIC will only be passed...

Page 8: ...f the technical aspects of the filtering language most filters are very similar in appearance and are easy to understand The following represents two filters one from Ethereal which is the most common...

Page 9: ...is time to take a look at how you can benefit from Airscanner Mobile Sniffer In addition we have included a section on Ethereal to help you prepare for future analysis of collected data from Airscann...

Page 10: ...orrectly Symptoms of a problem include obvious error messages program crashes or the lack of promiscuous mode during an otherwise normal sniffing session 3 1 3 Installation Assuming you have met all t...

Page 11: ...outline the usage features of Airscanner Mobile Sniffer It assumes you have Airscanner Mobile Sniffer installed and working properly To use Airscanner Mobile Sniffer locate the MobileSniffer icon in...

Page 12: ...apters are usually not easy to understand 3 1 5 Menus Airscanner Mobile Sniffer is laid out in a functional and logical format There are two menu options on the menu bar at the bottom of the pocket PC...

Page 13: ...o review This option was included to let you make the decision if you wanted the old data erased or not It is set by default to clear the screen at the start of each capture session Promiscuous Mode A...

Page 14: ...is is set at a default of 100 packets This is a conservative setting but we prefer to allow you to increase this setting to a higher value as your Pocket PC device permits If it is too high you could...

Page 15: ...e Sniffer This option is covered in detail in the filtering section Enable Filter By default filtering is not enabled when sniffing However if you want to narrow down the collected data to an exclusiv...

Page 16: ...ets the capture files View Packet Details While knowing the IP address and MAC address of each packet is useful the real power of sniffing is knowing what is inside the packet This option gives you th...

Page 17: ...to define where on the pocket pc you want to save the capture file Like the Save Packets to option this will help you control where to store data to avoid overflowing the pocket pc s device Start Sto...

Page 18: ...This can help you narrow down traffic to a particular service Port Number The port number is important because it often indicates the reason for the traffic For example port 80 is the default port use...

Page 19: ...2 2 Installation on Windows Installation varies depending on the platform Because 98 of people using this program employ either a Linux distribution such as RedHat or a Windows operating system we wil...

Page 20: ...d files Text2Pcap Tool for converting raw ASCII hex to libpcap format packet capture files Mergecap Tool for merging several capture files into one file 6 6 Finish installation 3 2 2 4 Running Etherea...

Page 21: ...e data in the packet Packet Detail This window contains more detailed information about the packet such as MAC addresses IP address packet header information packet size packet type and more This is f...

Page 22: ...card must be able to receive and transmit data If the card does not work properly before using Ethereal it will certainly not work while it is running In addition if you are using a WNIC you might be...

Page 23: ...he ring buffer to create numerous files in case you collect the maximum number of packets required to fill up the first file it allows you to capture infinite amounts of data You can also adjust name...

Page 24: ...e Ethereal window In this example we will create a filter for AIM and Quake Quake is a multiplayer game whose mastery is an essential prerequisite for any competent security professional However if yo...

Page 25: ...ntences we stop the capture and let Ethereal load the data into the packet display windows At this point we have a great deal of commingled data How can we sort through this data to find our chat sess...

Page 26: ...g 4 Troubleshooting If you experience problems with Airscanner Mobile Sniffer please review the following symptoms to help guide your trouble shooting efforts Unable to set mode This error is given wh...

Page 27: ...in a sniff session Is this normal YES This is why any wireless network MUST be encrypted Email instant messages web pages and other tidbits of data are easily captured and read by a network If you can...

Page 28: ...IDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON A...

Reviews: