background image

  

2.4 Filters 

A good sniffer is more than just a packet collection device or program. At its 

fundamental layer, a sniffer simply gathers data and stores it in a file, which can grow to 
be several gigs in size in only a few minutes, or hours on a slower network. While this 
data is exactly what a troubleshooter wants, it can quickly become overwhelming and can 
in effect swamp the user with too much irrelevant information. In other words, finding 
that one desired piece of information can be much like finding a needle in a haystack.  

  
As a result, many sniffers have incorporated the use of filters to control and regulate 

the amount of, and type of, data that is collected and/or analyzed. If a sniffer uses a filter, 
data analysis can be easily narrowed down to just the information that is considered 
relevant to the job. In addition, if the filter is a pre-capture filter, it can significantly 
reduce the amount of irrelevant data that is captured, thus saving valuable time and 
resources that can become heavily taxed when collecting data for a long period of time. 

  
There are many variations of filters available, which are represented by a filtering 

language. These languages can be proprietary, or based off a standard filter, such as the 
OFDM (Open Filter Definition Language). Regardless of the technical aspects of the 
filtering language, most filters are very similar in appearance and are easy to understand. 
The following represents two filters, one from Ethereal, which is the most common free 
sniffer available, and the other using the OFDM language.  

  
Ethereal 
udp.srcport == 67 or udp.srcport == 68 or udp.destport ==67 or udp.destport == 68 
  
OFDM 
(udpport(src) == 67 || udpport(dest) == 67 || udpport(src) == 68 || udpport(dest) ==68) 
  
As this illustrates, filtering languages are basically a series of conditional statements. 

This example will filter all data for DHCP traffic, which can be detected due to its use of 
the UDP protocol and port numbers 67/68.  

  

2.5 The right sniffer for the job 

The quality of a sniffer is directly related to the information it can provide for its 

user. For example, dsniff is one of the best security sniffers available. This is not because 
dsniff captures any better than Ethereal, which is at the top of the list for many 
professionals; instead, it is because dsniff incorporates extra features, such as a built in 
password sniffer, arp spoofing technology, and more. These small additions make the 
program more streamlined, if collecting passwords is your goal. On the other hand, some 
troubleshooting will require the use of an expensive all-in-one hardware/software sniffer 
package. These devices, which would be overkill for a small network, can collect gigs of 
data and never miss a packet. 

  
In addition to landline sniffers, the introduction of wireless networks has caused the 

Summary of Contents for Mobile Sniffer

Page 1: ...Airscanner Mobile Sniffer For Windows Mobile Pocket PC Technical Whitepaper and User s Guide Level ___ Beginner _x_ Intermediate _x_ Advanced ___ Expert Estimated Reading Time 60 minutes...

Page 2: ...r TM Mobile Sniffer packs the power of a full scale sniffer into an application for portable devices Once your Windows Mobile device is linked to the network Airscanner TM Mobile Sniffer monitors all...

Page 3: ...006 Airscanner Corp Please ask permission before redistributing this software or user s manual Version History Version 1 0 released April 30 2003 Version 1 02 released May 7 2003 Version 2 0 released...

Page 4: ...ace or as part of a complex and very expensive hardware device e g 40 000 GTX Multi protocol analyzer that can handle multiple network lines and GBs of data Though it is just a tool it like many other...

Page 5: ...his is because there are several major types of wireless network cards WNICs available on the market Fortunately these have become more standardized across OEMs especially now that built in WiFi cards...

Page 6: ...etwork to see if any of the data is labeled with its MAC address If there is a match the data is passed up to the next layer in the protocol stack and ultimately to the program to which it was sent Ho...

Page 7: ...access to it 2 3 ARP Spoofing As we have previously discussed the existence of a switch in a network is a serious obstacle to a sniffer Due to a MAC IP table traffic from one NIC will only be passed...

Page 8: ...f the technical aspects of the filtering language most filters are very similar in appearance and are easy to understand The following represents two filters one from Ethereal which is the most common...

Page 9: ...is time to take a look at how you can benefit from Airscanner Mobile Sniffer In addition we have included a section on Ethereal to help you prepare for future analysis of collected data from Airscann...

Page 10: ...orrectly Symptoms of a problem include obvious error messages program crashes or the lack of promiscuous mode during an otherwise normal sniffing session 3 1 3 Installation Assuming you have met all t...

Page 11: ...outline the usage features of Airscanner Mobile Sniffer It assumes you have Airscanner Mobile Sniffer installed and working properly To use Airscanner Mobile Sniffer locate the MobileSniffer icon in...

Page 12: ...apters are usually not easy to understand 3 1 5 Menus Airscanner Mobile Sniffer is laid out in a functional and logical format There are two menu options on the menu bar at the bottom of the pocket PC...

Page 13: ...o review This option was included to let you make the decision if you wanted the old data erased or not It is set by default to clear the screen at the start of each capture session Promiscuous Mode A...

Page 14: ...is is set at a default of 100 packets This is a conservative setting but we prefer to allow you to increase this setting to a higher value as your Pocket PC device permits If it is too high you could...

Page 15: ...e Sniffer This option is covered in detail in the filtering section Enable Filter By default filtering is not enabled when sniffing However if you want to narrow down the collected data to an exclusiv...

Page 16: ...ets the capture files View Packet Details While knowing the IP address and MAC address of each packet is useful the real power of sniffing is knowing what is inside the packet This option gives you th...

Page 17: ...to define where on the pocket pc you want to save the capture file Like the Save Packets to option this will help you control where to store data to avoid overflowing the pocket pc s device Start Sto...

Page 18: ...This can help you narrow down traffic to a particular service Port Number The port number is important because it often indicates the reason for the traffic For example port 80 is the default port use...

Page 19: ...2 2 Installation on Windows Installation varies depending on the platform Because 98 of people using this program employ either a Linux distribution such as RedHat or a Windows operating system we wil...

Page 20: ...d files Text2Pcap Tool for converting raw ASCII hex to libpcap format packet capture files Mergecap Tool for merging several capture files into one file 6 6 Finish installation 3 2 2 4 Running Etherea...

Page 21: ...e data in the packet Packet Detail This window contains more detailed information about the packet such as MAC addresses IP address packet header information packet size packet type and more This is f...

Page 22: ...card must be able to receive and transmit data If the card does not work properly before using Ethereal it will certainly not work while it is running In addition if you are using a WNIC you might be...

Page 23: ...he ring buffer to create numerous files in case you collect the maximum number of packets required to fill up the first file it allows you to capture infinite amounts of data You can also adjust name...

Page 24: ...e Ethereal window In this example we will create a filter for AIM and Quake Quake is a multiplayer game whose mastery is an essential prerequisite for any competent security professional However if yo...

Page 25: ...ntences we stop the capture and let Ethereal load the data into the packet display windows At this point we have a great deal of commingled data How can we sort through this data to find our chat sess...

Page 26: ...g 4 Troubleshooting If you experience problems with Airscanner Mobile Sniffer please review the following symptoms to help guide your trouble shooting efforts Unable to set mode This error is given wh...

Page 27: ...in a sniff session Is this normal YES This is why any wireless network MUST be encrypted Email instant messages web pages and other tidbits of data are easily captured and read by a network If you can...

Page 28: ...IDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON A...

Reviews: