Capturing Network Traffic
Capturing Network Traffic
Capturing Network Traffic
Lab1
4/17/18
1.
Used the command ifconfig -a to see the list of connections made with the onion.
2.
Used the command netstat -a to see the the interface status.
3.
Used the command netstat –help to see the list of options for tcpdump
4.
Used the command sudo tcpdump -I eth0 icmp to capture any packets flying through the onion
5.
Used the command sudo tcpdump icmp -I eth0 -s 0 -w netcapture1.pcap -C 100 to capture the packets
flying in and saving it.
6.
Used the command sudo wireshark netcapture1.pcap to view the file that was created inside of
wireshark. And clicking ok for the warning message.
7.
8.
Section 1.2 Using tcpdump to capture ARP traffic
1.
2.
Used the command ping -c4 192.168.1.6 to ping the machine 4 times.
3.
Stopped the tcpdump and viewed the packets that flew in.
4.
Used the command arp -n for the ethernet connections and flags.
5.
Used the command sudo ip -s -s neigh flush all to look at all ip connections with the onion.
1.
Used the command netstat -I to view all the associated connections with the onion.
2.
Used the command sudo -I to go to the root of the security onion
Then I used the command echo ‘1’ > /pro/sys/net/ipv4/ip_forward then I confirmed it.
3.
4.
Used the command sudo arpspoof -I eth0 -t 192.168.1.1 192.168.1.50 to spoof the arp packets crossing
the onion.
5.
I used the command sudo urlsnarf -I eth0 to sniff out packets crossing the network.
6.
Used the command sudo ip -s -s neigh flush all to flush all the connections out of the network.
7.
I went to the website example.com in the ubuntu firefox
8.
Went to the security onion to view the results of the urlsnarf after going to example.com from the
ubuntu machine.
1.
Used the command sudo arpwatch -I eth0 in the ubuntu terminal and nothing seems to have happened
so far.
2.
Used the command tail -f /var/log/syslog to view the other command above.
1.
Used the command ifconfig -a to view the current interface conditions and none were down, all in
working condition.
2.
Used the command sudo wireshark and went to capture>interfaces and chose the eth1 interface to sniff
out DVL.
3.
Went to the DVL server and typed proftpd in the command prompt to initiate the FTP server.
4.
Used the command ftp 10.1.1.10 in the ubuntu machine to connect to the ftp server of the DVL
machine.
5.
Results of above
6.
After logging in on the ftp server, went to the security onion and stopped the capture. Put an ftp filter
in, and then had this result.
1.
Stopped the last capture, now capturing a new security onion packets.
2.
Used the command service ssh status to view the secure shell status. I then type sudo service ssh start
to start the secure shell in case it didn’t start.
3.
Did the command sftp [email protected] to attempt to connect to the pc of the student in ubuntu.
4.
Went back to the security onion, stopped the scan, and typed ssh in the filter, I found a result of a key
exchange between 2 machines in encryption.
1.
Used the command sudo dumpcap -I eth0 -w /tmp/netcapture2.pcap and starting capturing traffic
across the network.
2.
Went to the ubuntu machine, opened firefox, typed the ip of 192.168.1.6 and the security onion screen
popped up.
3.
Results of the capture above. From the security onion
1.
Used the command sudo /opt/networkminer/networkminer to open the window on the left.
2.
Navigated to open>mycomputer>HDD>tmp>netcapture2.pcap
3.
I navigated to files>right clicked 1 file and opened it. This was the result.