存档

作者存档

Detecting Trojan and Worm with Capsa Network Analyzer

2010年4月30日 9 条评论

Trojan and Worms are two major threats to network security. Do you know what exact is a Trojan horse? In Wikipedia, Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations.

Almost all Trojans and worms need an access to network, because they have to send data out to the hacker. Only the useful data are sent to the attacker the Trojan accomplishes its mission. So it should be a good solution that we start from the aspect of traffic analysis and protocol analysis technology. We are going to detect the Trojan horse and worm with the help of a –network analyzer-Colasoft Capsa. Capsa is an easy-to-use and intuitive network analyzer, which provides enough information to help check if there is any Trojan activities in our network. In this article I’m going to show you how to spot a Trojan or worm.

5 solutions to find the trace of a Trojan or worm in LAN network:

Solution 1: The Summary Tab

1
Concentrate on TCP packet summary. We should be alerted when TCP SYN Sent number is much larger than TCP SYN ACK Sent number. Generally the ratio of these two numbers approximately equals 1:1. Trojans and worms always send large amount of TCP SYN packet to the network and try to establish connections with other machines. When a connection established, they try to penetrate into the target machine.

Solution 2: IP Endpoint Tab

2
We can reorder the rows by clicking the column headers of the Packet Sent, Packet Received or IP conversation. Pay attention to the node with big statistics. They, however, might be BitTorrent downloading. But Trojans and worms definitely send out a large amount of packets.

Solution 3: The Log Tab

3
Focus on the DNS Log. We could make a list of target websites of Trojan horses by Google. For example, website like *****.3322.org. Furthermore, we can store the DNS log and analyze by using filters of the Trojans’ keywords.

Solution 4: Using Filters

04
Build filters rules with patterns of some Trojans and worms. Until they send a packet out, we will get those Trojans’ and worms’ activities. This method has its drawback that it does nothing to a new Trojan or worm.

Solution 5: The TCP Conversation Tab & UDP Conversation Tab

5
6
When Trojan or worm activities are found in our network, we can locate the machine’s IP address in the Node Explorer and then check its TCP Conversation or UDP Conversation. In TCP Conversation tab, we can read the reconstructed data of the communication in Data Flow sub tab, (the UDP Conversation is with the Data sub tab). Attentions have to be paid if the conversation is sending your system information.
Above are the featured tabs of Capsa network analyzer that we often use to detect network problems or bottlenecks. Moreover, we can spend some time to study what ports do the Trojans and worms like to use such as Executor:80, Ultors Trojan:1234. Then when we troubleshoot the network and make the analysis, we should pay attention to the node sending or receiving packets to and from these ports as well.

Long Island Rail Road has chosen Capsa Network Analyzer

2010年4月27日 3 条评论

After trying out the demo version, Long Island Rail Road gives a thumbs-up to Colasoft Capsa Analyzer and chooses Capsa to be the guardian of its digital health.

The Long Island Rail Road (reporting mark LI) or LIRR is a commuter rail system serving the length of Long Island, New York that has been classified as a Class II railroad by the Surface Transportation Board. It is the busiest commuter railroad in North America, servicing around 81 million passengers each year, and the oldest US railroad still operating under its original name and charter. There are 124 stations on the LIRR, and more than 700 miles (1,100 km) of track on its two lines to the two forks of the island and eight major branches.

分类: News & Events 标签:

How to improve network protocols learning and teaching

2010年4月26日 9 条评论

In computing, a protocol is a set of rules which is used by computers to communicate with each other across a network. A protocol is a convention or standard that controls or enables the connection, communication, and data transfer between computing endpoints. In its simplest form, a protocol can be defined as the rules governing the syntax, semantics, and synchronization of communication. Protocols may be implemented by hardware, software, or a combination of the two. At the lowest level, a protocol defines the behavior of a hardware connection. A protocol is a formal description of message formats and the rules for exchanging those messages.

Today, there are many universities or institutes opening training section of network protocols. More and more people interested in computer programming are learning network protocols. They get training, have books or videos, they are fabulous about protocols. Network protocol analyzer is regarded as the best tool to help improve network protocols learning and teaching. There are many people using Wireshark to help learn or teach network protocols, Colasoft Capsa can also do this, and maybe better.

Now, let’s see how Capsa helps to improve network protocols learning and teaching in a more graphical and intuitive way.

Protocol decoding is the basic functionality as well. There is a Packet tab, which collect all captured packets or traffic. Select a packet and we can see its hex digits as well as the meaning of each field. The figure below shows the structure of an ARP packet. This makes it easy to understand how the packet is encapsulated according to its protocol rule.
001

For more complicated study such as how to establish a TCP connection by a three-way handshake, how to close a TCP connection, how the window size changes, and how to calculate the TCP SEQ number and ACK number, the Time Sequence functionality is helpful and intuitive. The Time Sequence tab displays the packet movement of a TCP conversation with two-direction arrows. The following figure sketches a complete process of a TCP conversation, from connection establishment to connection close. The columns on the left side of the arrows show the calculation of sender’s SEQ and ACK numbers. And also we can see the window size. On the right-side of the arrows, they are the receivers’.
002

Furthermore, for scientific research in network communication and protocols, we may need to create protocols of our own. Colasoft Capsa allows us to customize protocols. It’s very easy to create a protocol rule of TCP, UDP, IP and Ethernet II. See figure below.
003

Colasoft Capsa is a powerful protocol analyzer shipped with four powerful tools-packet builder, packet player, ping tool and mac scanner. The packet builder helps teachers and rookies to create or build packets like ARP, IP and TCP packets. The packet player can be used to send packets into the network to test the network. You can also import packet files captured by other network sniffers as well. With the assistance of network protocol sniffer tools, the theories on the book will no longer be dry and boring. Let Caps help you dig into the micro network world.

How to Detect Possible Network Loops in Network?

2010年4月12日 23 条评论

Do you know what a network loop is? Have you ever had a network loop in your LAN? No matter you want it or not, a network loop in the LAN can bring down your whole network.

First, let’s see what a network loop is. What does a network loop do? A network loop is a network configuration there is more than one path between two computers or devices, which causes packets to be constantly repeated. This is due to the fact that a hub will blindly transmit everything it receives to all connections – other devices, such as switches and routers, might be able to reduce or eliminate this problem.

In this article, I’m going to show you how to detect the network loops in network with Capsa network analyzer 7.1?

Let’s start Capsa, and then add in the packet file into the ready-to-replay list. Without any other settings, click this icon to start replay directly.
01
To detect network loops, first we come to the Dashboard tab. The graphs show that the traffic is not big. We can conclude that, no machine is keeping sending a large sum of packets, to block the bandwidth.
02
We can sure from the Protocol tab, that only ICMP is used in the traffic. However, in Diagnosis tab, there is one record, IP TTL too low, which means a packet has passed too many routers. That is a sign od network loop.
03
And we can see the anomaly happens at IP address, one seventy two, dot sixteen, dot two zero eight, dot thirty three. Let’s start from this address. Right-click on the address, and locate it.
04
Then, go directly to the packet tab. We can see all the packets are ICMP packets. And we find the delta time between the packets is very small, and there are more than twelve thousand packets. This couldn’t be normal. Just a simple ping can’t produce so many packets, it looks like network loop a little bit.
05
To confirm our guess, we should go down to the digits in the packets. We can compare the field information of different packets, by checking the fields in this pane. While we come to the identification field, we can see there are so many packets have the same identification number. We know that one ICMP packets has its own identification number, there’s no way that so many packets have the same number. Now we are much sure it’s a network loop. But to make sure of this, we need to see another important field, TTL value. Check the Time To Live field. We can see that the same ICMP packet loops around the router, and each time it passes the router, its TTL value is reduced by one. Until its TTL value comes to zero, it’s dropped by the router. Then another packet does it again.
06
This is the end of the story. Hope you already know how to find out network loop in network with network sniffer.
A video tutorial for troubleshooting network loops is avaliable at http://www.colasoft.com/download/arp_flood_arp_spoofing_arp_poisoning_attack_solution_with_capsa.php

How to Detect MAC Flooding Attack in your LAN?

2010年4月6日 9 条评论

In a typical MAC flooding attack, a switch is flooded with packets, each containing different source MAC addresses. The switch records these addresses to its CAM table. When the table is full, the switch cannot look up the right destination port, but to broadcast out on all ports. A malicious user could then use a packet sniffer running in promiscuous mode to capture sensitive data from other computers, which would not be accessible were the switch operating normally.

How to detect if there’s a MAC flooding attack in the network? In this article, I will demonstrate to you with Colasoft Capsa Analyzer.

For detecting MAC flooding attack. Let’s start capture, we start the analysis from the SUMMARY TAB. All these statistics seem right. Except one when we come to the Physical address count. There are more than a hundred thousand MAC addresses discovered in this network. How could this small network have so many machines? Possibly, it is a mac flooding attack.

1

We need to check the addresses in the NOD EXPLORE. Open the physical explorer, and look this number; there are more than 1800 MAC addresses in local segment. It’s abnormal; there is no way that so many machines exist in this network. And apparently, these addresses are not real. We are sure that there are worm activities, or attacks in the network.

2

Let’s see how these nodes are communicating. Open the MATRIX TAB. And we choose Top 1000 physical node matrix type. We see this matrix, what a mess! There are so many nodes communicating, and according to the colors of the line, red means one way transmitting.

3

And we can go to the PHYSICAL CONVERSATION TAB to read that it’s true. Almost all nodes only send one packet out. Most packets are 64 bytes.
We know that all machines in our network are connected with a switch. This looks like a MAC flooding attack.

4

Still, to confirm our prediction, we need to see the original data of the packets they send out. Open the PACKET TAB. We see the delta time between packets is very small, which gives a great pressure to the switch. Almost all packets are 64 bytes. And let’s look at the original data in the packets. Almost all packets are randomly generated by padding same digits in the packets.

5

According to all these behaviors, and decoded information from packets, we are pretty sure that there is MAC flooding in this network. But it’s hard to find the attacker’s address directly because all addresses are forged. However, we can cut some machines off the network to eliminate the innocent machines until we find the target one.
Watch the video tutorial of detecting MAC flooding attack is avaliable at Here!

Share Your Capsa Story, Win Acer Laptop!

2009年10月23日 没有评论

How are you using Capsa Network Analyzer to handle daily administration issues? How did you use Capsa Network Analyzer to solve your network problems? Share your story with us and You Can Win an Acer Laptop!

Have a look of our prizes!

Prizes

Attracted? Click here to see how to get one!

分类: News & Events 标签:

Colasoft Capsa Provides Comprehensive Network Analysis at Your Fingertips

2009年7月20日 没有评论

Wow! another review is done by one of the greatest media in technology, physorg.com.

As computers become more ingrained in the daily operations of most companies, it seems that running into problems occurs more frequently and with greater consequences. When it comes to computer networks, the key issues are security, speed, and reliability. A newly improved network analyzer called Capsa 6.9 R2, developed by Colasoft Inc., can help companies monitor, detect, and troubleshoot network problems. This review highlights some of the main features of Colasoft Capsa, which together make the product an overall powerful tool for maintaining network security.

To read a full review, please click here. And don’t forget to comment and vote!

分类: News & Events 标签: ,

Test-drive: Colasoft Capsa network analyzer – Review from TechRepublic

2009年7月20日 没有评论

We are pleased to announce one of the major media in computer and software technology, TechRepublic.com, recently published a review of Capsa network analyzer 😀

Having good insight to your network is critical. There are so many potential issues that can be going on that any additional tool can be welcome. This can include attacks, transmissions and applications without encryption, or incorrect configurations bogging down the network.

Recently, I had a chance to evaluate the Colasoft network analyzer or Capsa. Capsa offers a lot of features in a small package, though the network analyzer field is very crowded. One thing that can differentiate a network tool is ease of use.

To read a full review, click here. Do not forget to leave a message and vote for the review!

分类: News & Events 标签: ,

Capsa 6.9 Recently Reviewed by FiberDownload.com

2009年7月9日 没有评论

We are glad to see one of the biggest software directory, fiberdownload.com, recently tested Capsa 6.9 R2 and wrote us a very impressive review.

Capsa is a great and affordable all in one network analyzer tool that will help you carry out your daily activities without being afraid of Internet threats.
But the first question that you ask yourself when you see this application for the first time is What CAPSA means ?

After testing it, I would say that CAPSA, apart of being a great network monitoring tool, means :
Confidence
Afordability
Performance
Safety
Advanced

It’s quite impressive that we never explained the software name like this. To view the the full review, please click here

分类: News & Events 标签:

Colasoft Capsa 6.9 R2 Now Fully Compatible with Windows 7

2009年7月2日 4 条评论

We are so excited to announce a new version of our flagship product – Colasoft Capsa Network Analyzer. The latest released Capsa 6.9 R2 is now fully compatible with the current Windows 7 32bit and 64bit Edition, satisfying the users’ growing need for Win 7 compatibility.

Please check the following for new features and latest improvement of Capsa 6.9 R2. We hope you enjoy the new version! Any suggestions will be highly appreciated.

New Features:

  • Support Windows 7 32bit and 64bit Edition.
  • Packet Player: Support replay multiple packet files simultaneously.
  • Globally added two new options: alias(or hostname) and address can be displayed simultaneously.
  • There is a new option in the global Option settings users can enable to prevent hibernation when capturing.
  • New protocol ISL and FCoE can be recognized now.
  • Decoders for ISL, FCoE protocols.
  • Support Windows Server 2008 and X64 Edition.

Improvements:

  • An online help section activated in Start Page below Quick Link.
  • The Loopback won’t be shown in the NIC test wizard.

Bug Fixed:

  • A wrong value has been displayed in the decode area for IP Fragment Offset.
  • Users login as other windows ID will have to reactivate Capsa every time they login.

Download a Free Trial Now