300 likes | 421 Vues
In the realm of network security, two powerful sniffers are vying for supremacy: Ettercap and Ethereal. This guide explores their features, performance, and best use cases. Ettercap shines with real-time data views and a user-friendly GUI, perfect for testing network security through man-in-the-middle attacks. Ethereal, on the other hand, excels in packet analysis with detailed insights into every transaction. Discover how each tool performs in various trials—HTTP, HTTPS, and FTP—and gain insight into their strengths and weaknesses.
E N D
The Main Event Battle Of the Sniffers
Battle Of the Sniffers • The Champion • Ethereal: Network Analyzer • The Challenger • Ettercap: Network Security Suite
A look at Ettercap • Ettercap: Features • Packet Sniffing • Unified Sniffing • Bridged Sniffing • Logging • Real Time Data Views • Live Connections / Man-in-the-Middle
A look at Ettercap • Ettercap: Requirements • Unix Based OS • Windows NT/2000/Server 2003 • Libraries • libpcap 0.81 or higher • libnet 1.2.1.1 or higher • libpthread • zlib • Optional: GTK+, Ncurses, OpenSSL
A look at Ettercap • Ettercap: Installation • Website Download Available at: • http://ettercap.sourceforge.net/ • Linux Installation • Decompress using tar/gzip • ./configure.sh • make • make install
A look at Ettercap • Ettercap: The GUI • Ncurses GUI • Main Window
Using Ettercap • Getting ready to sniff • Select ”Sniff” • Select ”Unified Sniffing”
Using Ettercap • Sniffing Screen
Using Ettercap • Performing the Sniff • Select ”Start” • Select ”Start Sniffing” • Press ”ENTER” • Stop the Sniff by selecting ”StopSniffing”
Using Ettercap • Features While Sniffing: • Statistics. • Select ”View” then ”Statistics” • Results updatedin real time.
Using Ettercap • Features While Sniffing: • Connection View • Select ”View” then ”Connections” • Results updatedin real time.
Using Ettercap • Features While Sniffing: • Connection Details • Choose a connection in the Live Connections list and press ”ENTER” • Results updatedin real time.
Using Ettercap • More Features: • Host Scanning and targeting. • Plug-In System. • Logging. • Inject Information
The Sniffing Experiment • Three Trials • HTTP Request / Response • Secure HTTP Request / Response • FTP Transaction • Testing Platform • Pentium 3 Linux Computer • Fedora Core 2
First Trial: HTTP Transaction • Website: www.kmaxmedia.com • Ethereal • Showed very detailed information about each packet. • Setup of Connection • Request / Response • Closure of Connection • Also showed every packet that was used in the transaction.
First Trial: HTTP Transaction • Ethereal
First Trial: HTTP Transaction • Ettercap • Successful in sniffing the request and response. • But Ettercap would only sniff the payload. • Doesn't capture packet information. • Indications of timed caching of information. • Due to this, sometimes would erase the information.
First Trial: HTTP Transaction • Ettercap
Second Trial: HTTPS Transaction • Web Site: CIBCKaleem's Bank Account
Second Trial: HTTPS Transaction • Both sniffers were unable to show the plaintext. • 128-Bit Encryption at work. • Ettercap does have a feature to allow it to give a fake certificate for an attack but the environment was not ideal. • However, Ethereal recognized the public key used.
Second Trial: HTTPS Transaction • Ethereal
Second Trial: HTTPS Transaction • Ettercap
Third Trial: FTP Transaction • An FTP login was performed on ftp.kmaxmedia.com. This included a username and password. • Both sniffers were able to successful get the username and password information. But the presentation of the information was different. • Information was more readable in Ettercap.
Third Trial: FTP Transaction • Ethereal
Third Trial: FTP Transaction • Ethercap
The Battle: Some Observations • During the Sniffing • Ethereal would only show statistics on the type of packets sniffed while Ettercap would show statistics, profiles, connections and more in real time. • Any personal authentication information that is heard on the wire, ettercap would notify the user the minute it appears in the user messages section
The Battle: Some Observations • Extras • Ethereal • Thouough information of packets. • Broad support for most protocols. • Filtering features to help organize packets. • Can read capture logs from over 20 prograns. • Ettercap • Real time information delivered while sniffing. • A sniffer with weaponry. • Custom plugin support.
The Verdict • Ethereal • Best suited for packet analyzation. • Ettercap • Best suited to test security of a network. • Supplies the user with a variety of tools. • Plugins • Bridged Sniffing • Attacks • Not just a sniffer.
Ettercap: Pros and Cons • Pros • Very, very powerful tool. • Easy to use GUI interface. • Real Time Information while sniffing. • Ability to perform attacks easily. • Cons • Can be difficult to compile for Windows. • Curses GUI not too stable. Overlaps tables. • More documentation could be useful.
The Conclusion • ”With the dust settling in the battle of the sniffers, the new Ettercap proved to be a worthy foe against Ethereal possessing immense manipulating power which can change a network’s environment. However, it still needs time to develop itself into a robust, dependable and a mature tool like Ethereal. ” • Kaleem Maxwell