140 likes | 312 Views
Detection of Promiscuous nodes Using Arp Packets. By Engin Arslan. Introduction. Threats in local networks Packet sniffing can lead to access private, confidential data Use Arp packets to identify sniffers. Principle of Sniffing. Local networks are composed of Ethernet.
E N D
Detection of Promiscuous nodes Using Arp Packets By Engin Arslan
Introduction • Threats in local networks • Packet sniffing can lead to access private, confidential data • Use Arp packets to identify sniffers
Principle of Sniffing • Local networks are composed of Ethernet. • Messages sent through local networks are expected to reach right person
Principle of Sniffing • Network Interface Card manages to decide receive or drop packet • If own interface is destinationthen receive, drop otherwise • Set NIC to Prosmicious Mode to receive all packet regardless of destionation Sniffer
Hardware Filter • NIC basically can set up for 4 filters • Unicast: Receive packets destined to same address • Broadcast: Receive all broadcast packets • All multicast: Receive multicast packets • Promiscuous: Receive all packet on the network without checking destination
Arp Mechanism • Used to convert IP address & hardware address I am 192.1.10.15 with hw add 00.00.00.00.00.01 Who is 192.1.10.15
ARP Packet Detection&Response • There are two kinds of filtering • Hardware Filter: ARP packet is received if destination address of ARP is valid • Software Filter: Requested IP address is same as host address
Detection of Promiscuous Mode • Prepare ARP packet with following properties • Destination of ARP packet is targeted PC FF.FF.FF.FF.FF.FE
Send this packet to network • This packet is supposed to be blocked by hardware filter of target machine. If target machine reply ARP request, then it is in Promiscuous mode