Penetration Testing mailing list archives

Re: analysing captured packets


From: "Robin Wood" <dninja () gmail com>
Date: Sat, 1 Apr 2006 20:19:42 +0100

Hi
Thanks for the suggestions, looks like I'll be busy for a while. Don,
your papers look good I'll have a read through.

I've also had a look at the honeynet challenges and this one is the
one for beginners and packet analysis
http://www.honeynet.org/scans/scan23/ , from a quick look at the top
answer, he has come up with a very detailed analysis of the file. So I
know where I'm aiming, how long would people suggest that it would
take to get to this level of knowledge? The person answering says he
is a beginner but from his answer he is obviously a better level of
beginner to me! Obviously this depends on background and how much you
study, but is the person answering the questions likely to have a
months worth of experience or 6 months? When studying on my own I'm
always my own worst critic and feel that I'm picking things up too
slowly!

And pagvac, I will be, I just wish there were more hours in the day!

Thanks

Robin

On 4/1/06, pagvac <unknown.pentester () gmail com> wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I know that what I'm gonna say may sound silly, but what I recommend
you is simply to play with analyzing traffic A LOT. Just watch the
packets, filter them by protocol, IP address, or whatever you're
interested in (Ethereal is great for filters). Try to follow different
protocol "conversations" and try to understand what the requests and
responses mean.

Good luck on your sniffing experience my friend :-)

Robin Wood wrote:
Hi Can anyone give any pointers to good tutorials on how to go
about analysing network traffic captured during a pen-test.

I'm currently using ethereal but I'm not necessarily looking for an
 ethereal tutorial more a howto on what to look for in capture
files. Things like good protocols to spot (e.g. ftp logs in in
plaintext so you can grab login details), how to recognise what is
going on by watching the high level handshakes (e.g. a http get is
usually followed by a response containing html), things like that.

Thanks

Robin

------------------------------------------------------------------------------
 This List Sponsored by: Cenzic

Concerned about Web Application Security? As attacks through web
applications continue to rise, you need to proactively protect your
applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
 vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed
service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a
limited time we can do a FREE audit for you to confirm your results
from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------




-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFELj6ZjXB4hX6OC/cRAjvfAJ0Xrf9dLEPmdQ3LyJoK/0F2NqfLNwCdGmOk
Rf9OvoDbOIWvdxk8/NfTuPA=
=u9ZY
-----END PGP SIGNATURE-----



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------


Current thread: