Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: analysing captured packets
From: "Robin Wood" <dninja () gmail com>
Date: Tue, 4 Apr 2006 16:05:19 +0100

Thanks all.

I'm going to have a look through these as they should give me a good
base. The reason I want to learn about this is I'm getting into
wireless pen-testing and so will need to analyse the data I capture
during tests. So I'm not actually looking for analysys of attacks,
more higher level captured data, things like re-building emails,
watching windows domain logins that kind of thing.

Obviously, the same high level data flows over wireless as over wired
so techniques for either would help.

I should have been more specific when I posted my original question.

On 4/4/06, Dan Goldberg <dan () madjic net> wrote:
This is a good place to start learning about "what to look for":
http://www.packet-level.com/productsServ.htm#labkit
(I am not affiliated - nor have I been to the training)

Of course the SANS Institutes Intrusion Detection course is a great
place to develop hands on experience with analysis and the mastering
packet analysis course form SANS to.
(I am loosely affiliated with the SANS institute but do not gain
personally from these activities)

Dan

pagvac wrote:
I know that what I'm gonna say may sound silly, but what I recommend
you is simply to play with analyzing traffic A LOT. Just watch the
packets, filter them by protocol, IP address, or whatever you're
interested in (Ethereal is great for filters). Try to follow different
protocol "conversations" and try to understand what the requests and
responses mean.

Good luck on your sniffing experience my friend :-)

Robin Wood wrote:

Hi Can anyone give any pointers to good tutorials on how to go
about analysing network traffic captured during a pen-test.

I'm currently using ethereal but I'm not necessarily looking for an
ethereal tutorial more a howto on what to look for in capture
files. Things like good protocols to spot (e.g. ftp logs in in
plaintext so you can grab login details), how to recognise what is
going on by watching the high level handshakes (e.g. a http get is
usually followed by a response containing html), things like that.

Thanks

Robin

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? As attacks through web
applications continue to rise, you need to proactively protect your
applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed
service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a
limited time we can do a FREE audit for you to confirm your results
from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------






------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to
proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic
Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------


--
Dan Goldberg
MADJiC Consulting, Inc.
Information Security Services
http://www.madjic.net
--
dan () madjic net
GPG Fingerprint: FC61 396F 8952 EC76 8CCB DAF1 4DD9 5B4C 07E0 B0BA
Public Key: http://www.madjic.net/dbg.asc
--
Incident Handler - Internet Storm Center http://isc.sans.org/


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault