Build an Open Source Network Sniffer 99
An anonymous reader writes "This article reviews common issues of wireless security, and shows how to use open source software to suss out wireless networks, get information about them, and start recognizing common security problems. You will learn how build a lightweight wireless sniffer that runs on open source software and see how simple it is to interact with wireless networks."
What I really want (Score:5, Interesting)
Why not (Score:1, Insightful)
Better yet (Score:1, Insightful)
Re:Better yet (Score:1)
That's gonna cost extra...
Re:Why not (Score:1)
Re:Why not (Score:3, Informative)
* Buy wireless AP and a linux box with 2 NICs
* Hook one NIC to your network the other NIC to the wireless AP
* Download and install OpenVPN on your linux box
* Setup iptables to DROP all packets being forwarded from the outside NIC to the inside and vice versa:
# Assuming:
# * eth0 is the outside NIC
# * eth1 is the inside NIC
# * Default iptables policy is ALLOW
# * Your linux kernel supports iptables,
# and routing
iptables -A FORWARD -i eth0 -j DROP
iptables -
Re:What I really want (Score:5, Informative)
Re:What I really want (Score:1)
Re:What I really want (Score:5, Informative)
Re:What I really want (Score:4, Informative)
Sadly this isn't very secure, since mac addresses can be faked (my wireless router already has this feature built-in). However it looks like ipcop has other types of authentication too [Version 0.2 of IPCop will include an Amber Zone (Wireless DMZ) which will support CIPE, IPSec or VPNd encrypted connections among other things] so I will check it out :-)
Re:What I really want (Score:3, Informative)
It's more of a deterrent than an unbreakable security measure, but add enough deterrents and that wardriver might just use your neighbours unsecured network instead.
And if they manage to get access, they still have to crack an iptables firewall to get to your servers. Good enough for me.
Re:What I really want (Score:3, Informative)
(I did this when I firs
Re:What I really want (Score:1)
http://diswww.mit.edu/bloom-picayune/crypto/14238
and
http://www.politechbot.com/pipermail/politech/2003 -September/000038.html
They may have fixed this. I dunno, since the reaction of people on the list to this analysis made me write the whole thing off and unsubscribe.
Re:What I really want (Score:3, Informative)
The problem with IPCop and Smoothwall for that matter, is the inability to filter traffic outbound. All traffic originating on the "Green" (inside or internal) interface is permitted. Nachia and Slammer will fly right through this config. Any worm or virus or trojan that tries to use TFTP to download more tools will also be successful.
Permitting only the traffic that needs to traverse a firewall IN ALL DIRECTIONS is a basic firewall/security concept.
Re:What I really want (Score:2, Informative)
In the case of a worm like Slammer, it will be able to further propogate, Nachia will be able to flood your ISP connection, an attacker will be able to download a toolkit, etc...
Re:What I really want (Score:2, Funny)
But one of the neat things about IPcop is that it's one of them open source things. So while youre quite correct that the pretty GUI doesnt have an interface for egress filtering, you *can* hop into the shell and add in the iptables commands of your choice.
Re:What I really want (Score:1)
True. And I have done this with my own Smoothwall box. It would be nice to have this in the GUI. I believe it must be there before either of these firewall packages can claim that they can/should be used in business enviornments as is.
To answer
Re:What I really want (Score:1)
I'll contribute it if it turns out well.
Re:What I really want (Score:1)
Re:What I really want (Score:2)
ISA also cannot handle the same throughput of a checkpoint or a unix firewall on the same hardware.. I was working at a site using one just last week and it was constantly causing trouble, despite there being 6 of them supposedly load balanced.. And the ISA service itself depends on so many other things such as RPC and DCOM, things that really have no place whatsoever on a firewall.
And the na
Re:What I really want (Score:1)
For the life of me, I can't see where you'd codify that in IPCop. It seems to assume that the only traffic that needs to be regulated is inbound traffic. Prove me wrong and I'll
Egress filtering (Score:1)
And yes, it is possible through the iptables stateful firewall (older version used ipchains).
If you don't like managing your firewall rules by hand, there are plenty of perl scripts (bash shell scripts can be klunky and slow) to manage this for you.
This is also one method to add the myriad of anti-peer-to-peer addresses that keep growing day by day.
I love IPCop, and not just because Phil is
Re:What I really want (Score:5, Informative)
From the website above:
"NetReg is an automated system that requires an unknown DHCP client to register their hardware before gaining full network access. Through a simple web interface, the client is prompted for their user identification. Powerful scripts then retrieve the client's network fingerprint and store it along with the user's information in a database. The database provides administrators with real-time information for troubleshooting and auditing their networks. The entire system was developed utilizing unmodified, open-source servers and in-house developed CGI programs."
Re:What I really want (Score:1)
Re:What I really want (Score:1)
Re:What I really want (Score:1, Interesting)
Re:What I really want (Score:2)
The particular choice of VPN client/server software depends on the types of clients you'll want to allow, etc.
Re:What I really want (Score:1)
Re:What I really want (Score:1)
no, i'm not THAT crazy to run my php scripts as root
Re:What I really want (Score:2)
http://openbsd.org/faq/pf/authpf.html [openbsd.org]
Re:What I really want (Score:2, Informative)
Attach a forgeign computer and it prompts you to login. Non MIT users are prompted for name and email and only allowed 15 days access per year.
Apparently they key everything via MAC address. I let a friend borrow my old wireless NIC, when he went to register it welcomed ME back. I hadn't used the NIC
Re:What I really want (Score:1)
mount network drive -> add a few entries in the firewall
unmount -> remove entries
works a treat when all your tables are default drop
Re:What I really want (Score:2)
Assuming you were looking for accomplishing all of that and didn't care whether the buzzword "firewall" was involved.
Network "sniffer"? (Score:5, Interesting)
It is, however, a pretty neat text-only interface to enumerate broadcasting APs, and honestly, the code for the interface makes for more interesting examination than the code for the 'sniffing'.
Commercial Sniffer Applications (Score:4, Interesting)
Re:Commercial Sniffer Applications (Score:4, Interesting)
Re:Commercial Sniffer Applications (Score:2)
Um... ya, I'm guessing when the parent poster said "outragiously priced" they had products just like yours in mind. I mean, if the price *isn't even listed* on their website then you probably can't, or don't want to, afford it.
Re:Commercial Sniffer Applications (Score:1, Interesting)
Distributed sniffer sells because it can keep up with it's rated capacity, 2GB/s (the one I use) without dropping a single frame and the pre/post filters are great for slicing and dicing data. I can get to it from almost anywhere, and I don't have to monkey with it.
I am very grateful for the work done in open source projects and I sup
Wow, what a great article. (Score:5, Funny)
My favorite software slogan ever is for ethereal, "Sniffing the glue that holds the internet together"
I'm sure a lot of you know this but this is in reference to TCP/IP being called "the glue that holds the internet together" Oh so funny. And oh so off-topic. I'm sorry. I love you guys.
Re:Wow, what a great article. (Score:2)
Re:Wow, what a great article. (Score:1)
Linksys WRT54G/GS (Score:5, Interesting)
Simple hardware solution (Score:5, Insightful)
Or you can buy a $30-50 card for your PC which might or might not be able to do monitor mode depending on your drivers, and might or might not reliably go into monitor mode depending on the exact sequence of iwconfig/ifconfig/catting stuff into files in
Of course if you're running around with a laptop the Linksys option is a bit tricky since you need to feed power to it. For basic indoor problem-solving it's unbeatable. Unless someone comes up with a reliable source for prism2.5/3's.
Still need to find a good 802.11a solution though.
Re:Simple hardware solution (Score:5, Informative)
Re:Simple hardware solution (Score:2)
Re:Simple hardware solution (Score:2)
Re:Simple hardware solution (Score:1)
Project box disappointment (Score:1)
The problems with Open Source Sniffers (Score:1, Informative)
There's a paper which discusses the problem quite well: http://luca.ntop.org/Ring.pdf [ntop.org]
The thing which I found surprising is how awful Linux stood up to the tests. The standard Linux kernel + stack was dropping the majority of packets; a
Re:The problems with Open Source Sniffers (Score:2, Interesting)
I suppose you can stick your head in the sand, but unless you know how to deal with this, you're misleading people if you think you're actually capturing packets on a high-speed network.
This is actually an important problem for those of us who are trying to use Linux in this area; and this is the first paper I've seen which actually describes the problem, how to reproduce it, and some work-arounds for
packet library/RTOS the issue, not closed vs open (Score:2)
Yes, a specialized kernel is needed. Yes, some other kernels, maybe QNX, might be better than plain vanilla BSD or Linux kernel. Yes, MS Windows isn't even anywhere remotely close to supporting this kind of techno
Wireless and Open Source, the sad story (Score:1, Insightful)
Here, I would like to call everyone's attention so people get rid of the cloth in front of the eyes and see the real status: some do NOT provide info, like Conexant for their new generation prism54 ( Intersil did for the first gen [prism54.org]), Intel for their 2100 [sourceforge.net] or 2200 [sourceforge.net] chips or TI for the acx100 [sourceforge.net]. Others provide binary only drivers, like Atheros (dig in the OpenBSD source, they reverse engi
Re:Crotchbusters (Score:2)
Start by obtaining a beagle.
wireless tools for linux... (Score:1)
kismet requires special drivers to scan, but if you figure that winxp comes with a simple interface for this built-in, it's kinda depressing that we can't seem to build a good tool that can do that, list the available networks, and give a good connect to them.. (without beating my head on the kernel modules, been there, it hurts, especial
Re:wireless tools for linux... (Score:1)
the whole thing was about 2 pages of code, and only used the wireless-tools package...
read the manual for iwconfig and associated tools
Not really want I was looking for.... (Score:2)
Windows users love to rub in how easily their linksys tools do this for them... I want an equivalent for my Ubuntu box.
I am the new wave of Linux users- "the more GUI the better" (TM).
Re:Not really want I was looking for.... (Score:1)
check out gkismet... that'll give you the gui.
Re:Not really want I was looking for.... (Score:1)
Re:Not really want I was looking for.... (Score:1)
Re:Not really want I was looking for.... (Score:1)
OK, but a bit disappointing (Score:1)
When I see sniffer I think something that captures packets and does at least a basic protocol decode on them (ie. SnifferPro - overpriced though it is, or Ethereal - great free package).
Am I missing something or is this just a OSS tool to enumerate wireless networks?
threads? (Score:2)
I don't understand why this project needs the magic of threads instead of just sockets.
Re:threads? (Score:2)
Personally, if I were doing this again, I probably wouldn't use threading for it.
Uhm dude... that's not a sniffer... (Score:2)
What's up with tcpdump [tcpdump.org] and friends, snort [snort.org], kismet [kismetwireless.net], bsd-airtools [dachb0den.com] and ethereal [ethereal.com] anyway?
Kismet and Wardriving (Score:2)
For those of us interested in maps of what wardrivers have found in your neighborhood, check out WiFiMaps.com [wifimaps.com].
Good luck, you'll need it! (Score:2)
Only if you have a certificate signed by me, you will get a tunneled IP-address allowing you to access to both the internal LAN and the internet (and the server itself).
How about an open source T1 sniffer (Score:1)
Do a google search on 'PRI Tester' and you'll find dozens of hand held devices that run about $3K. I'd like a laptop with a ISDN PCMCIA card running just a simple stack to sniff what the other end is transmitting.
Yeah, yeah, yeah, I'll look around on my own.