List of Figures

 < Day Day Up > 



Chapter 1: Introducing Network Analysis

Figure 1.1: Example Network Analyzer Display
Figure 1.2: Example of Sniffing a Connection
Figure 1.3: Carnivore Configuration Program
Figure 1.4: Hub Collision Domains
Figure 1.5: Switch Collision Domains
Figure 1.6: Port Mirroring

Chapter 2: Introducing Ethereal: Network Protocol Analyzer

Figure 2.1: Ethereal’s GUI
Figure 2.2: Follow the TCP Stream
Figure 2.3: Incorrect Ethereal Placement
Figure 2.4: Correct Ethereal Placement Using Port Spanning
Figure 2.5: Correct Ethereal Placement Using a Hub
Figure 2.6: Ethereal Placement with a Cable Tap
Figure 2.7: Fully Meshed Network
Figure 2.8: Network Troubleshooting Methodology

Chapter 3: Getting and Installing Ethereal

Figure 3.1: The WinPcap Installation Wizard
Figure 3.2: The WinPcap License Agreement
Figure 3.3: WinPcap Setup Status
Figure 3.4: WinPcap Readme Information
Figure 3.5: WinPcap Installation Complete
Figure 3.6: The Ethereal GNU License Agreement
Figure 3.7: Ethereal Installation Components
Figure 3.8: Ethereal Installation Directory
Figure 3.9: Ethereal Installation Status
Figure 3.10: Ethereal Installation Completed

Chapter 4: Using Ethereal

Figure 4.1: Main Window
Figure 4.2: Protocol Tree Window Collapsed
Figure 4.3: Protocol Tree Window Expanded
Figure 4.4: Data View Window
Figure 4.5: Data View Window Byte Selection
Figure 4.6: Filter Bar
Figure 4.7: Filter Bar Drop-down List
Figure 4.8: File Menu
Figure 4.9: Open Dialog Box
Figure 4.10: Save As Dialog Box
Figure 4.11: Save As Dialog: File Formats
Figure 4.12: Print Dialog Box
Figure 4.13: The New Print Dialog Box
Figure 4.14: Edit Menu
Figure 4.15: Find Packet Dialog Box
Figure 4.16: Go To Packet Dialog Box
Figure 4.17: Time Reference Submenu
Figure 4.18: Time Reference Submenu Example
Figure 4.19: Preferences Dialog Box
Figure 4.20: View Menu
Figure 4.21: Display Options Dialog Box
Figure 4.22: Apply Color Filters Dialog Box
Figure 4.23: Edit Color Filter Dialog Box
Figure 4.24: Background Color Dialog Box
Figure 4.25: Edit Color Filter
Figure 4.26: GTK+2 Foreground Color Dialog Box
Figure 4.27: Apply Color Filters Dialog Box
Figure 4.28: Application of Color Filters
Figure 4.29: Show Packet in New Window
Figure 4.30: Capture Menu
Figure 4.31: Capture Options Dialog
Figure 4.32: Capture Dialog Box
Figure 4.33: Capture Options Dialog Box: Use Ring Buffer Selected
Figure 4.34: Edit Capture Filter List Dialog Box
Figure 4.35: Edit Capture Filter List Dialog Box Example
Figure 4.36: Edit Capture Filter List Dialog Box: Copy
Figure 4.37: Analyze Menu
Figure 4.38: Edit Display Filter List Dialog Box
Figure 4.39: Filter Expression Dialog Box
Figure 4.40: Filter Expression Dialog: Equality
Figure 4.41: Edit Display Filter List Dialog Box: Filter String
Figure 4.42: Edit Display Filter List Dialog Box: Filter Name
Figure 4.43: Display Filter Dialog Box: OK/Apply Buttons
Figure 4.44: Match Submenu
Figure 4.45: Enabled Protocols Dialog Box
Figure 4.46: Decode As Dialog Box: Link Tab
Figure 4.47: Decode As Dialog Box: Transport Tab
Figure 4.48: Decode As: Show
Figure 4.49: Contents of TCP Stream Window
Figure 4.50: Follow TCP Stream: Direction Selector
Figure 4.51: TCP Analysis Submenu
Figure 4.52: Time-Sequence Graph (Stevens)
Figure 4.53: Time-Sequence Graph (tcptrace)
Figure 4.54: Time-Sequence Graph (tcptrace): Magnify
Figure 4.55: Time-Sequence Graph (tcptrace): Zoom
Figure 4.56: Time-Sequence Graph(tcptrace): Diagnosis
Figure 4.57: Time-Sequence Graph (tcptrace): Zoom in on Retransmit
Figure 4.58: Throughput Graph
Figure 4.59: RTT Graph
Figure 4.60: Graph Control Dialog Box: Zoom Tab
Figure 4.61: Graph Control Dialog Box: Magnify Tab
Figure 4.62: Graph Control Dialog Box: Origin Tab
Figure 5.63: Graph Control Dialog Box: Cross Tab
Figure 5.64: Graph Control Dialog Box: Graph Type Tab
Figure 4.65: Summary Dialog Box
Figure 4.66: Protocol Hierarchy Statistics Dialog Box
Figure 4.67: Statistics Submenu
Figure 4.68: Help Menu
Figure 4.69: Help Contents Dialog Box
Figure 4.70: Supported Protocols Dialog Box
Figure 4.71: About Plugins Dialog Box
Figure 4.72: About Ethereal Dialog Box
Figure 4.73: Summary Window Pop-up Menu
Figure 4.74: Protocol Tree Window Pop-up Menu
Figure 4.75: Data View Window Pop-up Menu

Chapter 5: Filters

Figure 5.1: Capture Options Dialog Box
Figure 5.2: Display Filter Name for IP Total Length
Figure 5.3: Display Filter Name for IP
Figure 5.4: SMB Response
Figure 5.5: HTTP Headers as Text
Figure 5.6: TCP Ports for HTTP Traffic
Figure 5.7: Ethernet Source and Destination Address Fields
Figure 5.8: Capture Options Dialog Box
Figure 5.9: Ethereal Main Window and Filter Button
Figure 5.10: Capture Filter Dialog Box
Figure 5.11: Display Filter Dialog Box
Figure 5.12: Display Filter Dialog After Clicking New
Figure 5.13: Display Filter Dialog After Clicking Copy
Figure 5.14: Filter Expression Dialog Box
Figure 5.15: Filter Expression Dialog With Operation That Accepts Values
Figure 5.16: Filter Expression With Field That Has Labeled Values

Chapter 7: Integrating Ethereal with Other Sniffers

Figure 7.1: Open Capture File Dialog Box
Figure 7.2: File Open Error
Figure 7.3: Save Capture File As Dialog Box
Figure 7.4: Ethereal Display of Tethereal Capture
Figure 7.5: Ethereal Display of TCPDump Capture
Figure 7.6: Ethereal Display of WinDump Capture
Figure 7.7: Ethereal Display of Snort Capture
Figure 7.8: Ethereal Display of Snoop Capture
Figure 7.9: Microsoft Network Monitor Window
Figure 7.10: Microsoft Network Monitor Frame View Window
Figure 7.11: Ethereal Display of Network Monitor Capture
Figure 7.12: The Packet Decode of the Capture Window
Figure 7.13: Ethereal Display of EtherPeek Capture
Figure 7.14: The Packet Display Window
Figure 7.15: Ethereal Display of Netasyst Capture
Figure 7.16: Ethereal Display of nettl Capture
Figure 7.17: Zethereal User Interface

Chapter 8: Real World Packet Captures

Figure 8.1: TCP Connect Scan
Figure 8.2: SYN/ACK Responses
Figure 8.3: SYN Scan
Figure 8.4: Xmas Scan
Figure 8.5: Null Scan
Figure 8.6: SubSeven Legend Backdoor Trojan
Figure 8.7: SubSeven Client-Server Interaction
Figure 8.8: NetBus Backdoor Trojan
Figure 8.9: NetBus Client-Server Interaction
Figure 8.10: NetBus Client-Server Content
Figure 8.11: RST.b Backdoor Scan
Figure 8.12: SQL Slammer Propagation Attempt
Figure 8.13: Code Red Stage 1 – Infection and Propagation
Figure 8.14: Code Red Exploit Output
Figure 8.15: Code Red Stage 2 – Denial of Service
Figure 8.16: Ramen Work Propagation Scanning
Figure 8.17: Ramen Worm rpc.statd Exploit
Figure 8.18: Ramen Worm Execution

Chapter 9: Developing Ethereal

Figure 9.1: Main Directory
Figure 9.2: epan Directory
Figure 9.3: Image Directory
Figure 9.4: Packaging Directory
Figure 9.5: Plugins Interface
Figure 9.6: Lemon Directory
Figure 9.7: Dissector Data Displayed in the Decode Window
Figure 9.8: Sample Display Filter
Figure 9.9: Summary Pane
Figure 9.10: Closed Item in Decode Pane
Figure 9.11: Expanded Item in Decode Pane
Figure 9.12: Visual Display of Multi-level Tree View
Figure 9.13: Visual Display of Bits
Figure 9.14: Example of LDAP Preference
Figure 9.15: Example of Value String Display



 < Day Day Up > 



Ethereal Packet Sniffing
Ethereal Packet Sniffing (Syngress)
ISBN: 1932266828
EAN: 2147483647
Year: 2004
Pages: 105
Authors: Syngress

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net