Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Anyone used packet analysis tools? [modified]

Anyone used packet analysis tools? [modified]

Scheduled Pinned Locked Moved The Lounge
toolscsharpphpcomlinux
17 Posts 11 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L Lost User

    I may need to reverse engineer some software [that sends large amounts of TCP/IP data using a tool] like Packetyzer[^] or Ethereal[^] (Windows or Linux), does anyone have experiences/nightmares to share? Thanks. Elaine (eternally appreciative fluffy tigress) -- modified at 10:53 Monday 22nd January, 2007

    The tigress is here :-D

    M Offline
    M Offline
    Marc Clifton
    wrote on last edited by
    #2

    Years ago (before .NET) I used RawEther[^] for packet analysis and spoofing for an Internet over satellite simulator. It worked quite well, the nightmares I can remember dealt with little vs. big endian and, for injecting packets, something about how the checksum calculation was done was a bit bizarre. I haven't used either of the two tools you mentioned. A couple books on TCP/IP and UDP were very helpful as well. Marc

    Thyme In The Country

    People are just notoriously impossible. --DavidCrow
    There's NO excuse for not commenting your code. -- John Simmons / outlaw programmer
    People who say that they will refactor their code later to make it "good" don't understand refactoring, nor the art and craft of programming. -- Josh Smith

    1 Reply Last reply
    0
    • L Lost User

      I may need to reverse engineer some software [that sends large amounts of TCP/IP data using a tool] like Packetyzer[^] or Ethereal[^] (Windows or Linux), does anyone have experiences/nightmares to share? Thanks. Elaine (eternally appreciative fluffy tigress) -- modified at 10:53 Monday 22nd January, 2007

      The tigress is here :-D

      R Offline
      R Offline
      Ray Cassick
      wrote on last edited by
      #3

      Just curious... why do you need to reverse engineer Ethereal? Is it not open source?


      My Blog[^]
      FFRF[^]


      L 1 Reply Last reply
      0
      • L Lost User

        I may need to reverse engineer some software [that sends large amounts of TCP/IP data using a tool] like Packetyzer[^] or Ethereal[^] (Windows or Linux), does anyone have experiences/nightmares to share? Thanks. Elaine (eternally appreciative fluffy tigress) -- modified at 10:53 Monday 22nd January, 2007

        The tigress is here :-D

        R Offline
        R Offline
        Roger Stoltz
        wrote on last edited by
        #4

        I've used Ethereal. I don't claim to be an expert, far from it. But is it really Ethereal you want to "reverse engineer", or is it the WinPCAP[^]? -- Roger


        "It's supposed to be hard, otherwise anybody could do it!" - selfquote

        L 1 Reply Last reply
        0
        • L Lost User

          I may need to reverse engineer some software [that sends large amounts of TCP/IP data using a tool] like Packetyzer[^] or Ethereal[^] (Windows or Linux), does anyone have experiences/nightmares to share? Thanks. Elaine (eternally appreciative fluffy tigress) -- modified at 10:53 Monday 22nd January, 2007

          The tigress is here :-D

          J Offline
          J Offline
          jhaga
          wrote on last edited by
          #5

          Trollslayer wrote:

          anyone have experiences/nightmares to share?

          Problems I have had is to really cath all packets on the network. Some raw packet sniffers seems to catch outgoing pakets only if windows firewall is enabled etc.. jhaga

          It would be glorious to see mankind at leisure for once. It is nothing but work, work, work. I cannot easily buy a blank-book to write thoughts in; they are commonly ruled for dollars and cents. A[man], seeing me making a minute in the fields, took it for granted that I was calculating my wages. — business! - I think that there is nothing, not even crime, more opposed to poetry, to philosophy, ay, to life itself, than this incessant business. Henry David Thoreau

          1 Reply Last reply
          0
          • R Ray Cassick

            Just curious... why do you need to reverse engineer Ethereal? Is it not open source?


            My Blog[^]
            FFRF[^]


            L Offline
            L Offline
            Lost User
            wrote on last edited by
            #6

            Sorry, I meant reverse engineer some software using a tool like Ethereal. The software in question send large amounts of data to a piece of cable TV headend equipment. Elaine (look it's Monday)

            The tigress is here :-D

            1 Reply Last reply
            0
            • R Roger Stoltz

              I've used Ethereal. I don't claim to be an expert, far from it. But is it really Ethereal you want to "reverse engineer", or is it the WinPCAP[^]? -- Roger


              "It's supposed to be hard, otherwise anybody could do it!" - selfquote

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #7

              Sorry, I meant reverse engineer some software using a tool like Ethereal. The software in question send large amounts of data to a piece of cable TV headend equipment. Elaine (look it's Monday)

              The tigress is here :-D

              R 1 Reply Last reply
              0
              • L Lost User

                Sorry, I meant reverse engineer some software using a tool like Ethereal. The software in question send large amounts of data to a piece of cable TV headend equipment. Elaine (look it's Monday)

                The tigress is here :-D

                R Offline
                R Offline
                Roger Stoltz
                wrote on last edited by
                #8

                Trollslayer wrote:

                Sorry, I meant reverse engineer some software using a tool like Ethereal.

                Ok. You're instantly forgiven. Regarding experiences and/or nightmares I think of Ethereal as the tool I'd use because it's free, easy to install, easy to use and provides flexibility beyond what I've ever needed. Nice filtering possibilities on both protocol and address. The only "drawback" in my opinion is that it uses WinPCAP which hooks at driver level, which means that packets that take "shortcuts" ni the ip-stack won't be detected such as sending to localhost. To be able to track the packets, they have to be tranfered to the NIC. -- Roger


                "It's supposed to be hard, otherwise anybody could do it!" - selfquote

                L 1 Reply Last reply
                0
                • R Roger Stoltz

                  Trollslayer wrote:

                  Sorry, I meant reverse engineer some software using a tool like Ethereal.

                  Ok. You're instantly forgiven. Regarding experiences and/or nightmares I think of Ethereal as the tool I'd use because it's free, easy to install, easy to use and provides flexibility beyond what I've ever needed. Nice filtering possibilities on both protocol and address. The only "drawback" in my opinion is that it uses WinPCAP which hooks at driver level, which means that packets that take "shortcuts" ni the ip-stack won't be detected such as sending to localhost. To be able to track the packets, they have to be tranfered to the NIC. -- Roger


                  "It's supposed to be hard, otherwise anybody could do it!" - selfquote

                  L Offline
                  L Offline
                  Lost User
                  wrote on last edited by
                  #9

                  I might have to set up a PC as a gateway to intercept the traffic so this won't be a problem. Thanks. Elaine :rose:

                  The tigress is here :-D

                  1 Reply Last reply
                  0
                  • L Lost User

                    I may need to reverse engineer some software [that sends large amounts of TCP/IP data using a tool] like Packetyzer[^] or Ethereal[^] (Windows or Linux), does anyone have experiences/nightmares to share? Thanks. Elaine (eternally appreciative fluffy tigress) -- modified at 10:53 Monday 22nd January, 2007

                    The tigress is here :-D

                    E Offline
                    E Offline
                    El Corazon
                    wrote on last edited by
                    #10

                    Trollslayer wrote:

                    does anyone have experiences/nightmares to share?

                    I've written and done packet analysis, you've got better tools than I, so I expect you will be fine. Make sure you are prepared to start partitioning your data. You'll get a LOT to work with. Taking apart a communication system via raw packets is like learning chinese from a book written by a Monk in the mountains you never met, can't ever hope to reach, and you have no idea what was on his mind when he wrote it, and only the faintest idea about the subject. It's data browsing at its finest... that looks like it is changing as a double float (exponent and mantissa regions), that looks like a long int, notice how the last byte rarely changes? I used to do cryptography puzzles as a child, eventually reaching the stage where you get no hints, no partial key, only that it is a substitution cypher and you know the number of letters in each word and each substitution is constant (though I graduated even beyond that by teens, this is sufficient). I loved that kind of search, this looks like it might be that... set test, examine the result. So for me it was rather obvious a jump into decrypting raw packets. You'll get everything even stuff you don't want to see... first step partition out the stuff you believe is NOT your comm traffic, isolate down the data, then you can start taking apart the comm protocol. :) good luck! by the way... be careful... reading raw ethernet traffic is akin to being "curious." I think I lost a life or two at that stage....

                    _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                    L 1 Reply Last reply
                    0
                    • E El Corazon

                      Trollslayer wrote:

                      does anyone have experiences/nightmares to share?

                      I've written and done packet analysis, you've got better tools than I, so I expect you will be fine. Make sure you are prepared to start partitioning your data. You'll get a LOT to work with. Taking apart a communication system via raw packets is like learning chinese from a book written by a Monk in the mountains you never met, can't ever hope to reach, and you have no idea what was on his mind when he wrote it, and only the faintest idea about the subject. It's data browsing at its finest... that looks like it is changing as a double float (exponent and mantissa regions), that looks like a long int, notice how the last byte rarely changes? I used to do cryptography puzzles as a child, eventually reaching the stage where you get no hints, no partial key, only that it is a substitution cypher and you know the number of letters in each word and each substitution is constant (though I graduated even beyond that by teens, this is sufficient). I loved that kind of search, this looks like it might be that... set test, examine the result. So for me it was rather obvious a jump into decrypting raw packets. You'll get everything even stuff you don't want to see... first step partition out the stuff you believe is NOT your comm traffic, isolate down the data, then you can start taking apart the comm protocol. :) good luck! by the way... be careful... reading raw ethernet traffic is akin to being "curious." I think I lost a life or two at that stage....

                      _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                      L Offline
                      L Offline
                      Lost User
                      wrote on last edited by
                      #11

                      Thanks Jeff, assuming it happens I will get the chance to run test patterns through the existing system which will be a big help. I mean... how hard could it be? :rolleyes: Elaine (oddly optimistic fluffy tigress)

                      The tigress is here :-D

                      E 1 Reply Last reply
                      0
                      • L Lost User

                        Thanks Jeff, assuming it happens I will get the chance to run test patterns through the existing system which will be a big help. I mean... how hard could it be? :rolleyes: Elaine (oddly optimistic fluffy tigress)

                        The tigress is here :-D

                        E Offline
                        E Offline
                        El Corazon
                        wrote on last edited by
                        #12

                        Trollslayer wrote:

                        I mean... how hard could it be?

                        about as difficult as washing two cats at once... err... I mean riding bareback on a bronco with a nasty temper, who was also just bitten by a wasp

                        _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                        T 1 Reply Last reply
                        0
                        • L Lost User

                          I may need to reverse engineer some software [that sends large amounts of TCP/IP data using a tool] like Packetyzer[^] or Ethereal[^] (Windows or Linux), does anyone have experiences/nightmares to share? Thanks. Elaine (eternally appreciative fluffy tigress) -- modified at 10:53 Monday 22nd January, 2007

                          The tigress is here :-D

                          A Offline
                          A Offline
                          Anton Afanasyev
                          wrote on last edited by
                          #13

                          Wireshark. That's what Ethereal is now. I dont think theres many changes ATM though.


                          :badger:

                          1 Reply Last reply
                          0
                          • L Lost User

                            I may need to reverse engineer some software [that sends large amounts of TCP/IP data using a tool] like Packetyzer[^] or Ethereal[^] (Windows or Linux), does anyone have experiences/nightmares to share? Thanks. Elaine (eternally appreciative fluffy tigress) -- modified at 10:53 Monday 22nd January, 2007

                            The tigress is here :-D

                            S Offline
                            S Offline
                            S Douglas
                            wrote on last edited by
                            #14

                            Packetyzer is a cool wrapper around ethereal.

                            Packetyzer Website:

                            Windows user interface for the Ethereal packet capture and dissection library

                            Packetyzer makes it easy to look at each packet and dissect what’s being transmitted. Go ahead install it without fear. I’ve recommended it to a couple of network admins who have fallen in love with it. It's been a couple of months since I have openen Packetyzer but as memory serves you can set a filter, just watching packets from one IP to another. Very nice when trying to figure out what's being sent.


                            I'd love to help, but unfortunatley I have prior commitments monitoring the length of my grass. :Andrew Bleakley:

                            1 Reply Last reply
                            0
                            • E El Corazon

                              Trollslayer wrote:

                              I mean... how hard could it be?

                              about as difficult as washing two cats at once... err... I mean riding bareback on a bronco with a nasty temper, who was also just bitten by a wasp

                              _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                              T Offline
                              T Offline
                              Tired of Shize
                              wrote on last edited by
                              #15

                              I love it when someone says something like that. It just kinda sets the stage for an interesting story. My favorite sniffer has always been Sniffer Pro 4.7. Wireshark et al, are ok. The guru of packet analysis (Laura Chappell) would tell you to make sure you know your protocol thouroughly so you understand whats going on. Good luck, and let us know how it went.

                              1 Reply Last reply
                              0
                              • L Lost User

                                I may need to reverse engineer some software [that sends large amounts of TCP/IP data using a tool] like Packetyzer[^] or Ethereal[^] (Windows or Linux), does anyone have experiences/nightmares to share? Thanks. Elaine (eternally appreciative fluffy tigress) -- modified at 10:53 Monday 22nd January, 2007

                                The tigress is here :-D

                                S Offline
                                S Offline
                                si618
                                wrote on last edited by
                                #16

                                I've used Ethereal (btw, it's now called

                                1 Reply Last reply
                                0
                                • L Lost User

                                  I may need to reverse engineer some software [that sends large amounts of TCP/IP data using a tool] like Packetyzer[^] or Ethereal[^] (Windows or Linux), does anyone have experiences/nightmares to share? Thanks. Elaine (eternally appreciative fluffy tigress) -- modified at 10:53 Monday 22nd January, 2007

                                  The tigress is here :-D

                                  R Offline
                                  R Offline
                                  remailer
                                  wrote on last edited by
                                  #17

                                  I don't know what the fuss is. By the way, Ethereal is now known as WireShark see http://wireshark.org Run it, select interface, hit capture, tcp streams are the easiest to follow, click 'Follow Stream'. In the time that it took to post this message the job would probably already be done.

                                  1 Reply Last reply
                                  0
                                  Reply
                                  • Reply as topic
                                  Log in to reply
                                  • Oldest to Newest
                                  • Newest to Oldest
                                  • Most Votes


                                  • Login

                                  • Don't have an account? Register

                                  • Login or register to search.
                                  • First post
                                    Last post
                                  0
                                  • Categories
                                  • Recent
                                  • Tags
                                  • Popular
                                  • World
                                  • Users
                                  • Groups