Download Module 3 Network Packet Crafting

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Wireless security wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

IEEE 1355 wikipedia , lookup

RapidIO wikipedia , lookup

Net neutrality law wikipedia , lookup

Computer network wikipedia , lookup

Airborne Networking wikipedia , lookup

Network tap wikipedia , lookup

Net bias wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Packet switching wikipedia , lookup

Deep packet inspection wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Distributed firewall wikipedia , lookup

Transcript
Presented by Heorot.net
Understand abilities and limitations of
crafting network packets
 Determine goals when crafting packets
 Identify and use packet crafting tools


Abilities
 Shape data to make it look the way you
want
 Possible to evade firewalls and Intrusion
Detection Systems (IDS)
 Create scripts around crafted packets

Limitations
 You can only do what the network allows
you to do
 Some attacks are blind – there’s no real way
to know your results unless you have
additional access to the network
 Learning curve - deep understanding of
TCP/IP, firewall rules, IDS signatures,
hardware requirements
 It doesn’t work like they show in the movies

What are you trying to achieve?
 Firewall evasion
 Focus on ports
 IDS invasion
 Change Content
 System Exploitation
 Unauthorized access, Denial of Service,
 Network Exploitation
 Unauthorized access to different networks, Denial of
Service, Elevated network privileges
 Network Device Exploitation
 Unauthorized access, Denial of Service, Sniffing
For further training and hands-on practice with these targets, check
out the advanced training opportunities at Heorot.net

Sniffers
 Tcpdump
 Wireshark

Packet Crafters
 Hping
 Nemesis
 Scapy
*Reminder:
The point of this course is to learn the
concepts and techniques to successfully complete a
penetration test – it is not to learn tools.
Understand abilities and limitations of
crafting network packets
 Determine goals when crafting packets
 Identify and use packet crafting tools
