Thursday, March 5, 2009

Free Packet Sniffer Software

Freeware To Capture and Analyze Traffic On Your Network

From Tony Bradley, CISSP, MCSE2k, MCSA, A+, for About.com

Ethereal Network Analyzer
Ethereal is a free network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, viewing summary and detail information for each packet. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.

Snoop Analyzer Standard
SnoopAnalyzer Standard is a network protocol analyzer based on network data capturing technology under Microsoft Windows platforms(95/98/Me/2000/NT/XP).

AnalogX PacketMon
AnalogX PacketMon allows you to capture IP packets that pass through your network interface - whether they originated from the machine on which PacketMon is installed, or a completely different machine on your network!

Network Probe
This free network monitor and protocol analyzer gives you an instant picture of the traffic situation on your network and enables you to monitor network traffic in real time, hunt down, identify, and isolate traffic problems and congestions on your network.

Analyzer
Analyzer is a full configurable network analyzer program for Win32 environment. Analyzer is able to capture packets on all platforms (and link-layer technologies) supported by WinPcap, except for Windows 95.

Sniphere
Sniphere is an another network wiretapping program for Windows using winpcap. Nevertheless, Sniphere is a pretty handy program with a lot of possibilities which most of free sniffers do not have.

Network Stumbler Wireless Packet Sniffer
Network Stumbler is a neat little program that allows you to see all the available Wi-Fi access points and networks that are in range of you and your active Wi-Fi computer. Network Stumbler is for desktop and laptop machines, and Mini Stumbler is the equivalent for the Wi-Fi enabled PDA.

IP Sniffer
IP sniffer is a popular freeware packet sniffer that uses the XP/2K Raw Socket features. IP Sniffer supports filtering rules, adapter selection, packet decoding, advanced protocol description and more. Detailed information about each packet is provided in a tree-style view, and the right-click menu allows to resolve or scan the selected source IP address. There are many additional features that are very useful.

PlasticSniffer
PlasticSniffer is a small and easy packet sniffer. In spite of its small size, PlasticSniffer offers some advanced features like IP filtering, port specific tracking, IP list and and option to ignore selected IPs. It does not offer the capabilities of a full featured packet sniffer, but it is exceptionally easy to use, and provides the information the average user is interested in. You must have .NET framework installed for PlasticSniffer to work.
Wifi related tools to get free internet connection and more

Tools included:

* NetStumbler-0.4.0: wireless access point identifier - listens for SSIDs and sends beacons as probes searching for access points.

* Kismet-2005-08-R: wireless sniffer and monitor - passively monitors wireless traffic and sorts data to identify SSIDs, MAC addresses, channels and connection speeds.

* Wellenreiter-v1.9: WLAN discovery tool - uses brute force to identify low traffic access points; hides your real MAC address; integrates with GPS.

* WEP-0.1.0: Unix based-pearl aplication encryption breaker - *****s 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.

* Airsnort-0.2.7e: encryption breaker - passively monitoring transmissions, computing the encryption key when enough packets have been gathered.

* Wepwedgie-0.1.0-alpha: for toolkit that determines 802.11 WEP keystreams and injects traffic with known keystreams in order to ***** WEP in minutes.

* Hotspotter-0.4: Wireless client attacking too.

Most programs are open source, and very useful if you know what your doing.

Also includes:

* Advanced Bash-Scripting Guide
This document is both a tutorial and a reference on shell scripting with Bash. It assumes no previous knowledge of scripting or programming, but progresses rapidly toward an intermediate/advanced level of instruction. The exercises and heavily-commented examples invite active reader participation. Still, it is a work in progress. The intention is to add much supplementary material in future updates to this document, as it evolves into a
comprehensive book that matches or surpasses any of the shell scripting manuals in print.

* Bash Guide for Beginners
The Bash Guide for Beginners gets you started with Bash scripting and bridges the gap between the Bash HOWTO and the Advanced Bash Scripting Guide. Everybody who wants to make life easier on themselves, power users and sysadmins alike, can benefit from reading this practical course. The guide contains lots of examples and exercises at the end of each chapter, demonstrating the theory and helping you practice. Bash is available on a wide variety of UNIX, Linux, MS Windows and other systems.

* The Linux Network Administrator's Guide, Second Edition
This book was written to provide a single reference for network administration in a Linux environment. Beginners and experienced users alike should find the information they need to cover nearly all important administration activities required to manage a Linux network configuration. The possible range of topics to cover is nearly limitless, so of course it has been impossible to include everything there is to say on all subjects. We've tried to cover the most important and common ones. We've found that beginners to Linux networking, even those with no prior exposure to Unix-like operating systems, have found this book good enough to help them successfully get their Linux network configurations up and running and get them ready to learn more.

Surf The World For Free WiFi Radar & WiFi Hack Tools (Snip The WiFi Soft, Brake Its Security, And Surf The Universe). Surf The Internet Freely Charged.

Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. This list is not meant to be comprehensive in nature but rather to provide some general guidance on recommended tools to build your toolkit.

See Dan Hoffman Hack a Blackberry LIVE
at ChicagoCon 2007

Finding Wireless Networks

Locating a wireless network is the first step in trying to exploit it. There are two tools that are commonly used in this regard:

Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range – A must have. It also has ability to determine Signal/Noise info that can be used for site surveys. I actually know of one highly known public wireless hotspot provider that uses this utility for their site surveys.


(NetStumbler Screenshot)

Kismet – One of the key functional elements missing from NetStumbler is the ability to display Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you should realize that Access Points are routinely broadcasting this info; it just isn’t being read/deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very critical in finding wireless networks.


(Kismet Screenshot)

Attaching to the Found Wireless Network

Once you’ve found a wireless network, the next step is to try to connect to it. If the network isn’t using any type of authentication or encryption security, you can simply connect to the SSID. If the SSID isn’t being broadcast, you can create a profile with the name of the SSID that is not being broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network is using authentication and/or encryption, you may need one of the following tools.

Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys. While many people bash the use of WEP, it is certainly better than using nothing at all. Something you’ll find in using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional tools and strategies that can be used to force the generation of traffic on the wireless network to shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.


(Screenshot of Airsnort in Action)

CowPatty – This tool is used as a brute force tool for cracking WPA-PSK, considered the “New WEP” for home Wireless Security. This program simply tries a bunch of different options from a dictionary file to see if one ends up matching what is defined as the Pre-Shared Key.


(Cowpatty Options Screenshot)

ASLeap – If a network is using LEAP, this tool can be used to gather the authentication data that is being passed across the network, and these sniffed credentials can be cracked. LEAP doesn’t protect the authentication like other “real” EAP types, which is the main reason why LEAP can be broken.


(Asleap Options Screenshot)

Sniffing Wireless Data

Whether you are directly connected to a wireless network or not, if there is wireless network in range, there is data flying through the air at any given moment. You will need a tool to be able to see this data.

Wireshark (formerly Ethereal) – While there has been much debate on the proper way to pronounce this utility, there is no question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.


(Screenshot of Ethereal in Action)


(Yahoo IM Session being sniffed in Ethereal)

The aforementioned utilities, or similar ones, will be necessities in your own wireless security toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab environment. And cost is no excuse as all of these tools are available freely on the Internet.

Protecting Against These Tools

Just as it’s important to know how to utilize the aforementioned tools, it is important to know best practices on how to secure your Wireless Network Against these tools.

NetStumbler – Do not broadcast your SSID. Ensure your WLAN is protected by using advanced Authentication and Encryption.

Kismet – There’s really nothing you can do to stop Kismet from finding your WLAN, so ensure your WLAN is protected by using advanced Authentication and Encryption

Airsnort – Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software update).

Cowpatty – Use a long and complex WPA Pre-Shared Key. This type of key would have less of a chance of residing in a dictionary file that would be used to try and guess your key and/or would take longer. If in a corporate scenario, don’t use WPA with Pre-Shared Key, use a good EAP type to protect the authentication and limit the amount of incorrect guesses that would take place before the account is locked-out. If using certificate-like functionality, it could also validate the remote system trying to gain access to the WLAN and not allow a rogue system access.

ASLeap – Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP type.

Ethereal – Use encryption, so that anything sniffed would be difficult or nearly impossible to break. WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine through an encrypted tunnel that would be encrypted with DES, 3DES or AES.

For you to enjoy free pc browsing with MTN, follow my step by step setup.

1. You need to have a pc suite of you phone installed on your system, preferrable nokia and sonyericsson.
2. Compatible Usb cable or Data cable of your phone for easy connectivity.
3. Mozilla firefox (PC browser)
4. Your Freedom software.
5. MTN sim card, GPRS enabled
6. Pc Java Platform 6.0

To Download any of them, check below.
@Your-freedom ( mediafire(.)com/yourfreedom or www(.)your-freedom(.)net/index.php?id=3)
@Mozilla ( www(.)mozilla(.)com/en-US/firefox/ or all version visit www(.)oldversion(.)com/program.php?n=firefox)
@Nokia pc suite ( www(.)softpedia(.)com/get/Mobile-Phone-Tools/Nokia/Nokia-PC-Suite.shtml or www(.)nokia.co(.)uk/A4630250) if this is not compactible with ur phone, try older version, google that, your self. For sonyericsson users, use the CD that comes with your phone d day u purchase it. Belgium patronisers, look for some one to use him own.
@Java 6.0 ( java(.)com/en/download/index.jsp) for all java here ( java(.)sun(.)com/javase/downloads/index.jsp)
PC CONNECTION STEPs
Step1: Intall your pc suite, after intallation connect your data cable on your phone then to your pc, your pc will recognise your phone and start modem intallation automatically, wait until is finished. On ur destop click on NOKIA PC SUITE, then
on CONNECT TO THE INTERNET, ONE TOUCH ACCESS will open, click on SETTINGS-NEXT-CONFIGURE MANUALLY-NEXT, input this ACCESS POINT: web.gprs.mtnnigeria.net
USERNAME & PASSWORD: web, Finally clik on finished.
Step2: Install your java platform, followed by YOUR FREEDOM software, when finished. Open YOUR-FREEDOM from Desktop.
a) Cancel the welcome message.
b) On your freedom, click on PORTS: mark SOCKS 4/5 & WEB PROXY.
c) Click on Status, then Configure. Input ADDRESS: 10.199.212.8@ems03.your-freedom.de
PORT: 443
PROTOCOL:https
OPTIONS: Mark first three, jump DNS, mark the next three.
INITIAL POST SIZE: 10000000
MINIMUM POST SIZE: 20000
d) Click on ACCOUNT INFORMATION: Username & Passport. Your will do this one your self. Goto www.your-freedom.net, click on FIRST VISIT? CLICK HERE
TO REGISTER. Fill their form, use ur valid email. after submitting, go to ur mail to activate ur registration. Note that ur must activate their mail before it will work.
e) Click on PROXY SETTINGS: PROXY ADDRESS: 10.199.212.2 PORT:8080
f) Click on SAVE and EXIT

Step3: Open MOZILLA FIREFOX from desktop, Click on TOOLS-ADVANCED-NETWORK-SETTINGS. Mark MANUAL PROXY CONFIGURATION: on HTTP PROXY: localhost PORT: 8080
mark USE THIS PROXY SERVER FOR ALL PROTOCOL. CLick OK-OK.
Step4: Close all the open windows, make sure that there is nothing on the taskbar. Open ur PC SUITE-click on Conn 2 d internet, it will connect automatically. Once is connected, open YOUR FREEDOM, keep watching it, it will get connected automatically. Finally, open MOZILLA FIREFOX and enjoy your free browsing.
Open YMsger, click on MESSENGER, select CONNECTION PREFERENCES. A dialog box will open, put a dot on USE PROXIES, mark ENABLE HTTP PROXY, SERVER NAME: localhost SERVER PORT:8080
Finally click APPLY.
that all. It works mostly on old version. To download Yahoo Messengers visits www(.)oldversion(.)com/program(.)php?n=yahoo
NB that the ( ) is excluded, is just an anti-LINK REMOVED. Also remember to reset your yahoo messanger and Firefox any time you want to use another network that work without freedom.

wap.mtnonline.com%2f%3a00@ems...., wks too
http://wap.mtnonline.com%2f%asiri0@freedom IP
configure your firefox proxy to
IP:127.0.0.1
PORT:8080
Other Your freedom servers

67.159.5.116
193.164.133.61
91.121.10.81
91.121.13.62
91.121.13.63
81.169.130.185
85.214.22.104
91.121.2.175
85.214.143.29
85.214.45.170
87.98.217.227
91.121.10.82
66.90.104.142
91.121.9.81
193.37.152.232
67.159.5.52
217.150.244.92
85.214.116.165
77.92.68.5
67.212.67.74
202.160.120.226
85.214.73.35
62.193.231.70
91.121.94.101
http://wap.mtnonline.com%2f%3a0%2f0%3a%2fix0fix4real@ems01
On your freedom, edit only Yfreedom address to
http://wap.mtnonline.com%2f%asiri0@85.214.45.170
Port remain 443
Save and try connet.
Note: Other settings Remain thesame.
The IP 85.214.45.170 is freedom master server, It help to redirect you to any available fast freedom server.

The trick is working perfectly well. If yours dosen't respond to the first trick, then on your freedom server connection.
mark only the following.

1. Automatically switch server
2. Automatically connect on startup
3. Reconnect after server shutdown
4. Use true SSL with https.

Others remain unmarked.

Note that, it will not connect if network is bad.