Mario,
You can do a few things that help determine if someone is sniffing your network
traffic by fighting technology with greater technology.
Detect if someone is using a promiscuous mode interface.
Detect someone using information from a sniff.
Install a checker on the systems to determine which system's interfaces are sniffing
aka agent based.
Enable MAC address monitoring and access control on switches
There are plenty of good tools for detecting this type of activity from network, to
system level
Antisniff is one of those tools
http://www.securitysoftwaretech.com/antisniff/
The Goal and Purpose of AntiSniff
As with all tools there is no "one size fits all". The industry clambers for the
silver bullet tool. A tool that comes directly off the shelf, needs no configuration
or modifications, has one hundred percent accuracy, and is completely foolproof. Such
a tool does not exist in the security world.
AntiSniff raises the bar. It is, in lieu of better terminology, the start of an
arms-race. Previously there existed no commercial tool to do what AntiSniff does. It
has been run in large scale organizations with great results and accuracy. So what
does it do and what does it not do?
The goal:
Detect machines on an Ethernet/IP network segment that are promiscuously monitoring
traffic not destined to them. The first release is designed to work on flat
non-switched environments.
The reason:
When an intruder obtains elevated privileges on a remote system a few things can
usually be expected. The machine is placed in promiscuous mode to monitor traffic on
the network. This often times rewards the intruder with usernames, accounts,
passwords, community strings, e-mail, and usage statistics to name just a few. Knowing
which machines on the network are in promiscuous mode often points to machines that
are already compromised. Once a machine is compromised it is not uncommon for the
holes that were exploited to be fixed and backdoors to be installed allowing future
remote access. A machine in this state might very well pass network security scanning
software checks with flying colors. A tool was needed to detect this situation.
What it will not detect:
If a machine on the network has no IP address, no IP stack associated with any of its
interfaces, or has no ability to be communicated with over the network then AntiSniff
will not detect it.
This is perfectly acceptable, as such a machine would not be compromised over the
network in the first place. If the machine were compromised over the network and the
network interface was removed this should be noticeable many other ways (i.e. shouts
down the hallway of "hey Joe! The R&D server stopped working!" are a dead giveaway to
a problem of some sort). If the device in question is a physical machine that must be
monitored or controlled in person, such as a dedicated hardware sniffer, then physical
access to the network in question has been obtained. This is a completely different
problem. In addition, such physical network tap devices are usually quite good at
monitoring for runt frames, duplicate IP addresses, etc. but are usually quite poor at
correlating data inside the packets for malicious purposes.
There will be other situations that arise with similar nuances. However, these will be
the minority and often legitimate systems as opposed to compromised multi-user
machines.
The Arms Race:
Can AntiSniff be defeated? Yes - anything can be defeated. Does this matter? Not
nearly as much as one might think. Currently, the methods of evading AntiSniff deal
with either making an interface non-addresable or adding in logic to the promiscuous
network monitoring program to stop monitoring the network when it sees tell tale signs
of AntiSniff running.
The former is not an issue, the reasoning already having been discussed above. The
latter, while a fun exercise, is less of an issue than one might expect. First, if the
monitoring agent turns itself off when it believes AntiSniff to be running then it
defeats, or severely impacts, the purpose of it being on the system in the first
place. Second, the signature of AntiSniff can be modified by the user. With modifiable
signatures the task of determining what is and what is not AntiSniff running on the
network should be much less accurate.
It is not our goal to fix the security posture of the world with a single product.
Merely to improve the current status and sufficiently raise the bar that attacks
intrusions are measured against.
-----Original Message-----
From: Mario Camara [mailto:[EMAIL PROTECTED]]
Sent: Tue 1/8/2002 9:13 PM
To: [EMAIL PROTECTED]
Cc:
Subject: How can I detect someone sniffing my network?
Can someone help me with that?
Mário Câmara
[EMAIL PROTECTED]
[EMAIL PROTECTED]
ICQ: 331 335