⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ch12.htm

📁 Maximum Security (First Edition) 网络安全 英文版
💻 HTM
📖 第 1 页 / 共 4 页
字号:
<BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>Cross Reference:</B></FONT><B> </B>There are also devices	that are referred to as cable sniffers, which are used to diagnose problems along	network cable. One such product is called the <I>Cable Sniffer</I> by Macally. It	can be used to sniff cable problems on AppleTalk networks. Their page is located	at <A HREF="http://www.macally.com/"><TT>http://www.macally.com/</TT></A>. <HR></BLOCKQUOTE><P>Sniffers are a significant threat because of the following:<UL>	<LI>They can capture passwords.<BR>	<BR>		<LI>They can capture confidential or proprietary information.<BR>	<BR>		<LI>They can be used to breach security of neighboring networks.</UL><H2><FONT COLOR="#000077"><B>Where Is One Likely to Find a Sniffer?</B></FONT></H2><P>You are likely to find a sniffer almost anywhere. However, there are some strategicpoints that a cracker might favor. One of those points is anywhere adjacent to amachine or network that receives many passwords. This is especially so if the targetedmachine is the gateway of a network, or a path of data going to or coming from theoutside world. If your network goes out to the Internet (and that's really what I'mgetting at here), the cracker will want to capture authentication procedures betweenyour network and other networks. This could exponentially expand the cracker's sphereof activity.<H2><FONT COLOR="#000077"><B>What Level of Risk Do Sniffers Represent?</B></FONT></H2><P>Sniffers represent a high level of risk. In fact, the existence of a sniffer initself shows a high level of compromise. In fact, if a sniffer has been placed onyour network (by folks other than those authorized to undertake such an action),your network is already compromised. That is, taking the case study out of the LANand into the Internet, if your Internet-enabled network has a sniffer, someone hasbreached your network security. One scenario is that he or she has come from theoutside and placed a monitoring device on your network. The other scenario is thatone of your own is up to no good. Either way, the situation is grave.</P><P>Security analysts characterize a sniffer attack as a second-level attack. Thecracker has already worked his or her way into your network and now seeks to furthercompromise the system. To do so, he must begin by capturing all the user IDs andpasswords. For that reason (and for the information a sniffer gathers), a snifferrepresents an extremely high level of risk.</P><P>However, sniffers can catch more than simply user IDs and passwords; they cancapture sensitive financial data (credit-card numbers), confidential information(e-mail), and proprietary information. Depending on the resources available to thecracker, a sniffer is capable of capturing nearly all traffic on a network.<BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>I do not believe that, in practice,	any sniffer can catch absolutely all traffic on a network. This is because as the	number of packets increases, the chances of lost packets is high. If you examine	technical reports on sniffers, you will discover that at high speeds and in highly	trafficked networks, a more-than negligible amount of data can be lost. This suggests	that sniffers employed by the good guys might be vulnerable to attacks themselves.	In other words, just how many packets per second can a sniffer take before it starts	to fail in its fundamental mission? That is a subject probably worth investigating.</P>	<P>Security technology has evolved considerably. Some operating systems now employ	encryption at the packet level, and, therefore, even though a sniffer attack can	yield valuable data, that data is encrypted. This presents an additional obstacle	likely to be passed only by those with deeper knowledge of security, encryption,	and networking. <HR></BLOCKQUOTE><H2><FONT COLOR="#000077"><B>Where Do Sniffers Come From and Why Do They Exist?</B></FONT></H2><P>Sniffers are designed as devices that can diagnose a network connection. You willremember that in Chapter 9, &quot;Scanners,&quot; I referred to a UNIX command called<TT>traceroute</TT>. <TT>traceroute</TT> examines the route between two points andis used to determine whether problems exist along that route (for example, if oneof the machines a&#218; g that route has died).</P><P>Tools such as <TT>traceroute</TT> are sniffers of sorts. However, a hard-coresniffer is designed to examine the packet traffic at a very deep level. Again, this--likethe scanner--has a perfectly legitimate purpose. Sniffers were designed by thoseaiding network engineers (and not for the purpose of compromising networks).</P><P>Some companies produce entire suites of sniffer applications designed to diagnosenetwork problems. The leading company in this industry is Network General Corporation(NGC), which offers a wide variety of sniffer products, including<UL>	<LI>The Sniffer Network Analyzer (I should mention that the term <I>The Sniffer</I>	is a registered trademark of NGC)<BR>	<BR>		<LI>A wide area network (WAN) Sniffer<BR>	<BR>		<LI>Network General Reporter</UL><H2><FONT COLOR="#000077"><B>On What Platforms Will a Sniffer Run?</B></FONT></H2><P>Sniffers now exist for every network platform, but even if they did not, theywould still be a threat to you. Here is why: Sniffers sniff packets, not machines.Unless your network is entirely homogenous, a sniffer could exist there. As I pointedout, a sniffer need be only on a single node of a network (or at a gateway) to snifftraffic. This is because of the manner in which Ethernet broadcasts occur. Becausethe traffic is broadcasted to all nodes on a network segment, any platform that youhave will do. Also, more sniffers for different operating systems emerge every fewmonths; because source is now available for a wide variety of systems, it seems likelythat trend will continue. Eventually, you will see the ultimate sniffer written forWindows 95 with some sort of VB front end. You can bet on it.<H2><FONT COLOR="#000077"><B>Has Anyone Actually Seen a Sniffer Attack?</B></FONT></H2><P>There have been many sniffer attacks executed over the Internet; these attackswere disparate in terms of target and scope. Consider this security advisement update:<DL>	<DD>In February 1994, an unidentified person installed a network sniffer on numerous	hosts and backbone elements collecting over 100,000 valid user names and passwords	via the Internet and Milnet. Any computer host allowing FTP, Telnet or remote log	in to the system should be considered at risk...All networked hosts running a UNIX	derivative operating system should check for the particular promiscuous device driver	that allows the sniffer to be installed.<FONT SIZE="1"><SUP>1</SUP></FONT></DL><BLOCKQUOTE>	<P><HR><FONT SIZE="1"><SUP>1</SUP></FONT>Naval Computer &amp; Telecommunications Area Master	Station LANT advisory. <HR></BLOCKQUOTE><DL>	<DD></DL><BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>Cross Reference:</B></FONT><B> </B>You can access the Naval	Computer &amp; Telecommunications Area Master Station LANT advisory at <A HREF="http://www.chips.navy.mil/chips/archives/94_jul/file14.html"><TT>http://www.chips.navy.mil/chips/archives/94_jul/file14.html</TT></A>.	<HR></BLOCKQUOTE><P>Naturally, institutions and private companies are reluctant to state what levelof compromise might have occurred. But, there are many such victims:<UL>	<LI>California State University at Stanislaus<BR>	<BR>		<LI>A United States Army missile research laboratory<BR>	<BR>		<LI>White Sands Missile Range</UL><BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>Cross Reference:</B></FONT><B> </B>For more information	about the Stanislaus incident, visit <A HREF="http://yahi.csustan.edu/studnote.html"><TT>http://yahi.csustan.edu/studnote.html</TT></A>.</P>	<P>For more information about the U.S. Army missile research lab and White Sands	Missile Range incidents, see the GAO report at <A HREF="http://www.securitymanagement. com/library/000215.html"><TT>http://www.securitymanagement.	com/library/000215.html</TT></A>. <HR></BLOCKQUOTE><P>Universities seem to be consistent targets, mainly because of the sheer volumeof usernames and passwords that can be gleaned from such an attack. This also translatesinto bigger and more complex networks. Network administration in a university isquite a job, even if crackers aren't prowling around. How many times have you fingeredan account at a university only to find that the target was discharged or graduateda year or more before? Two days before writing this chapter, I encountered exactlythat situation. Except that the individual had been gone 18 months. Even so, hisaccount was still active!<H2><FONT COLOR="#000077"><B>What Information Is Most Commonly Gotten from a Sniffer?</B></FONT></H2><P>A sniffer attack is not as easy as you might think. It requires some knowledgeof networking before a cracker can effectively launch one. Simply setting up a snifferand leaving it will lead to problems because even a five-station network transmitsthousands of packets an hour. Within a short time, the outfile of a sniffer couldeasily fill a hard disk drive to capacity (if you logged every packet).</P><P>To circumvent this problem, crackers typically sniff only the first 200-300 bytesof each packet. Contained within this portion is the username and password, whichis really all most crackers want. However, it is true that you could sniff all thepackets on a given interface; if you have the storage media to handle that kind ofvolume, you would probably find some interesting things.<H2><FONT COLOR="#000077"><B>Where Does One Get a Sniffer?</B></FONT></H2><P>There are many sniffers available on many platforms. As you might expect, themajority of these are commercial. Commercial sniffing applications are a good ideaif you have a real need to diagnose your network (or catch a cracker). They are probablya poor idea if you simply want to learn about networking.<H3><FONT COLOR="#000077"><B>Gobbler (Tirza van Rijn)</B></FONT></H3><P>Gobbler, shown in Figure 12.4, is probably the best sniffer for someone wantingto learn a bit about network traffic. It was designed to work on the MS-DOS platformbut can be run in Windows 95.</P><P><A NAME="04"></A><A HREF="04.htm"><B>Figure 12.4.</B></A><B><BR></B><I>Gobbler's opening screen.</I></P><P>Operation of Gobbler might seem a little confusing at first. There are no menusin the traditional sense (that is, the menus are not immediately apparent when youstart the application); the application just pops up, as shown in Figure 12.4. (Themenus are there; it is just that Gobbler is not the most user-friendly application.)Depending on what package you get, you may or may not receive documentation. If youdo, it will be a PostScript document titled <TT>Paper.gs</TT>. Of the four locationswhere I have found Gobbler, only one has the document. It is the first of the addressesthat follow.<BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>Cross Reference:</B></FONT><B> </B>Gobbler is no longer	widely distributed; these links are quite remote. Expect some download time. Gobbler	can be found at	<UL>	<LI><A HREF="http://www.cse.rmit.edu.au/~rdssc/courses/ds738/watt/other/gobbler.zip"><TT>http://www.cse.rmit.edu.au/~rdssc/courses/ds738/watt/other/gobbler.zip</TT></A><BR>	<BR>		<LI><A HREF="http://cosmos.ipc.chiba-u.ac.jp/~simizu/ftp.ipc.chiba-u.ac.jp/.0/network/noctools/sniffer/gobbler.zip"><TT>http://cosmos.ipc.chiba-u.ac.jp/~simizu/ftp.ipc.chiba-u.ac.jp/.0/network/noctools/sniffer/gobbler.zip</TT></A><BR>	<BR>		<LI><A HREF="ftp://ftp.mzt.hr/pub/tools/pc/sniffers/gobbler/gobbler.zip"><TT>ftp://ftp.mzt.hr/pub/tools/pc/sniffers/gobbler/gobbler.zip</TT></A><BR>	<BR>		<LI><A HREF="ftp://ftp.tordata.se/www/hokum/gobbler.zip"><TT>ftp://ftp.tordata.se/www/hokum/gobbler.zip</TT></A>	</UL>	<P><HR></BLOCKQUOTE><P>Press the F1 key after booting the application to view a legend that providesinformation about the program's functions (see Figure 12.5).</P><P><A NAME="05"></A><A HREF="05.htm"><B>Figure 12.5.</B></A><B><BR></B><I>Gobbler's function and navigation help screen.</I></P><P>Gobbler runs on any PC running DOS, Windows, Windows 95, and perhaps NT. It canbe run from a single workstation, analyzing only local packets, or it can be usedremotely over a network (this is an especially useful function).</P><P>Contained within the program are some fairly complex functions for packet filteringas well as an event-triggered mechanism (that is, one can specify a particular typeof packet that must be encountered before the deep logging process starts or stops).Perhaps most importantly, Gobbler allows you to view both the source and destinationaddresses for each packet without further effort (these are printed to the screenin a very convenient manner).</P><P>The program allows you to view the recording process as it happens. This is avital element of its usefulness. As noted in one of the case studies presented withthe application:

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -