• Title/Summary/Keyword: Sniffing Tool

Search Result 8, Processing Time 1.722 seconds

The Implementation of Sniffing Detector and Management Tool in Local LAN (로컬 LAN환경에서의 스니핑(Sniffing) 탐지 및 관리도구 구현)

  • 김기욱;김창수;정신일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.696-699
    • /
    • 2001
  • In these days, there are explosive growths of Internet users. But the damages of hacking are on the increase lately too. Currently, many researches for detection of hacking are studying, and there are many Hacking detection tools. In this thesis, We designed and implemented Sniffing detection and Management Tool, Which ran search an invasion by sniffing in Local LAN environment. The Implementation of Sniffing Detector and Management Tool are composed of two modules. In other words, They are Sniffing Detector Tool and Sniffing Management Tool. The Sniffing Detector Tool discovers implementation of the Sniffing from optional host to Sniffing Detector host. And The Sniffing Management Tool displays information of Sniffer on Web_Browser.

  • PDF

A Study of Communications Security by Using Key Generation and File Encryption (파일 암호화와 키 생성을 이용한 통신보안 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.316-319
    • /
    • 2010
  • File security is typically protected by encryption methods. The development of a network environment, such as the Internet according to the sharing of information between systems become commonplace, while providing convenience to users, individuals or organizations that facilitate access to sensitive information caused by hacking the system to attack the rapidly growing is a trend. This paper is the latest generation file system caused by the hacking attacks on the Sniffing for users using file encryption and key generation, Packet Sniffing Tool IP and data through the analysis are discussed. Through this study, the importance of protecting personal information by imprinting Proactive in the hacking incident, and what users will contribute to increase the level of security awareness.

  • PDF

A study on the risk of taking out specific information by VoIP sniffing technique (VoIP 스니핑을 통한 특정정보 탈취 위험성에 관한 연구)

  • Lee, Donggeon;Choi, Woongchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.117-125
    • /
    • 2018
  • Recently, VoIP technology is widely used in our daily life. Even VoIP has become a technology that can be easily accessed from services such as home phone as well as KakaoTalk.[1] Most of these Internet telephones use the RTP protocol. However, there is a vulnerability that the audio data of users can be intercepted through packet sniffing in the RTP protocol. So we want to create a tool to check the security level of a VoIP network using the RTP protocol. To do so, we capture data packet from and to these VoIP networks. For this purpose, we first configure a virtual VoIP network using Raspberry Pi and show the security vulnerability by applying our developed sniffing tool to the VoIP network. We will then analyze the captured packets and extract meaningful information from the analyzed data using the Google Speech API. Finally, we will address the causes of these vulnerabilities and possible solutions to address them.

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

Attack Analysis of Bluetooth Electrical IT equipment in Smart Grid (Smart Grid에 사용된 Bluetooth 전기IT기기에 대한 공격 분석)

  • Song, Jin-Young;Park, Dea-Woo;Kim, Eung-Sik
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.91-94
    • /
    • 2011
  • Smart Grid에 사용되는 전기IT기기에서 Bluetooth의 보안 취약점이 발견되고 있다. 특히 전기안전을 위한 감시센서 정보전달을 맡고 있어서 위험성은 더욱 커진다. 본 논문은 Bluetooth가 탑재된 전기IT기기에 대한 Hacking Tool 분석을 실시하고, Bluetooth 취약점을 이용한 DoS, Sniffing공격 등 Tool 공격을 실행하고, Smart Grid와 U-IT 전기기기와 전력망에 대한 보안 방안 제시를 한다.

  • PDF

VirtFrame: A Sniffing-based Throughput Estimation Scheme in IEEE 802.11 Wireless LANs (IEEE 802.11 무선랜 환경에서의 스니핑 기반 전송률 측정 기법(VirtFrame)에 관한 연구)

  • Seo, Sung-Hoon;Baek, Jae-Jong;Kim, Dong-Gun;Song, Joo-Seok
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.187-194
    • /
    • 2011
  • IEEE 802.11 wireless LAN has become the center of attention for one of the most dominant wireless networking technologies nowadays. In densely deployed wireless LANs, mobile stations are exposed to a number of AP, thus it is needed to select the best AP to associate with. The most common approach is to select the AP with the highest received signal strength. However it does not consider traffic load imposed to each AP so that it may cause the poor network performance. Therefore, in this paper, we propose a throughput estimation scheme for neighboring APs by sniffing the traffic within 802.11 networks. We devise a tool, named "VirtFrame", which is to estimate the station's capable throughput from neighbor APs based on the channel access time by virtually combining the sniffed frames. Simulation results show that our proposed scheme well matches that there exists correlation between the channel access time and the actual throughput of the APs.

Development Tool of Sniffing Vulnerability for Device based on Android (안드로이드기반 스마트디바이스의 스니핑 취약 분석을 위한 도구 개발)

  • Kim, Minchul;Suh, Taeweon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.697-700
    • /
    • 2015
  • 스마트디바이스의 확산으로 그에 따른 보안에 대한 중요성이 커지고 있다. 스마트디바이스의 정보를 보안하기 위해서는 소스코드에서 암호화가 필요하다. 하지만 모든 애플리케이션이 암호화가 돼있는 것은 아니다. 스마트디바이스의 구조를 모르는 사용자는 애플리케이션이 안전한지 모르기 때문에 정보가 암호화 돼있지 않는 애플리케이션을 사용할 경우 개인정보가 유출될 가능성이 농후하다. 따라서 이를 사용자에게 인지시켜주기 위해 암호화과정에 따른 암호화 복잡도를 체크할 수 있는 분석 툴을 개발하였다. 이 개발 툴은 오픈소스 기반인 와이어샤크와 카인과 아벨을 이용한 이차분석 툴로 사용자에게 해당 애플리케이션이 개인정보유출의 위험성을 제안한다.

Developing a Analysis Tool of Canopen Over EtherCat Protocol (Canopen over EtherCAT 프로토콜 분석 도구 개발)

  • Youn, Seung-Hui;Lee, Hyo-Rim;Choi, Guk-Choel;Lee, Chang-Hong;Kim, Dong-Hyun;Kim, Jong-Deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.434-437
    • /
    • 2021
  • Canopen over EtherCAT(CoE) is a Canopen protocol that operates based on EtherCAT in industrial sites. In order to analyze a CoE network system and a performance through packet sniffing and reversing, it is necessary to know Data Objects structure and changes of its value. However, since Data Objects in Canopen is dependent on the devices, there is a limitation by using an existing packet analysis program like a Wireshark. Therefore, we designed and developed a system that infers Data Objects structure and system configuration.

  • PDF