Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: analysing captured packets
From: Dan Goldberg <dan () madjic net>
Date: Tue, 04 Apr 2006 09:57:17 -0400

This is a good place to start learning about "what to look for":
http://www.packet-level.com/productsServ.htm#labkit
(I am not affiliated - nor have I been to the training)

Of course the SANS Institutes Intrusion Detection course is a great
place to develop hands on experience with analysis and the mastering
packet analysis course form SANS to.
(I am loosely affiliated with the SANS institute but do not gain
personally from these activities)

Dan

pagvac wrote:
I know that what I'm gonna say may sound silly, but what I recommend
you is simply to play with analyzing traffic A LOT. Just watch the
packets, filter them by protocol, IP address, or whatever you're
interested in (Ethereal is great for filters). Try to follow different
protocol "conversations" and try to understand what the requests and
responses mean.

Good luck on your sniffing experience my friend :-)

Robin Wood wrote:

Hi Can anyone give any pointers to good tutorials on how to go
about analysing network traffic captured during a pen-test.

I'm currently using ethereal but I'm not necessarily looking for an
ethereal tutorial more a howto on what to look for in capture
files. Things like good protocols to spot (e.g. ftp logs in in
plaintext so you can grab login details), how to recognise what is
going on by watching the high level handshakes (e.g. a http get is
usually followed by a response containing html), things like that.

Thanks

Robin

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? As attacks through web
applications continue to rise, you need to proactively protect your
applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed
service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a
limited time we can do a FREE audit for you to confirm your results
from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------






------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to
proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic
Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------


-- 
Dan Goldberg
MADJiC Consulting, Inc.
Information Security Services
http://www.madjic.net
--
dan () madjic net
GPG Fingerprint: FC61 396F 8952 EC76 8CCB DAF1 4DD9 5B4C 07E0 B0BA
Public Key: http://www.madjic.net/dbg.asc
--
Incident Handler - Internet Storm Center http://isc.sans.org/

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]