Packet Filtering: Catching the Cool Packets


Throughout this book I show the filters that I most often build to use on networks. Here is one quick list of the filters that you should have ready to go whenever needed.

Depending on your analyzer, some of these filters may be pre- built - you may consider, however, whether the filter is going to work for you. For example, Sniffer has an option to select FTP data as an application filter. This filter is based on port 21 usage for command sequences.

Unfortunately, however, most FTP communications negotiate a dynamic port number for exchange of data - you won't catch this traffic with the default Sniffer port filter. In Chapter 4, we’ll look at other ways to catch FTP traffic without a dependency on port values.

Filters Ya Gotta Have

In Appendix C and D, you’ll follow some step-by-step instructions to import my sample filter set into EtherPeek or Sniffer. I’ve included several of these filters in the set.

So there you have it. It's time now to start building all types of filters to use on your network. I have confidence in you that you can build every filter listed in this book. Once you start building filters, you'll find that it's addictive!


Категории