Monday, 30 December 2019

Year in Review - 2019

With just two days to go before the new year arrives, I figured this would be as good a time as any to review how 2019 went for me.

I've been able to accomplish a lot with https://tcpdump101.com including a full UI/UX redesign, updating and adding new Check Point modules and generally performing small bug fixes. Although lately I haven't had as much time to commit to it, I still plan on adding more features. I have started working on support for nmap and that's what I'm focusing on next. In terms of search engine results, here are my Google results for the year:

Average Position: 26.9
Average Click-Through: 5.6%
Total Impressions: 59,000
Total Clicks: 3,020

I'm happy that I'm able to reach around three thousand people and hopefully help them out. I also hope that they've bookmarked the site and continue to use it and learn from it.

I've started work on another small personal project called Gr@ve_Rose's Offensive PCap Enumerator (https://bitbucket.org/Grave_Rose/grope/src/master/) which has proved handy for both myself and a few members of our Red Team. It will process packet captures and do it's best to enumerate systems based on noisy packets such as ARP, SMB, DHCP, OSPF and others. It will work with both IPv4 and IPv6 PCaps and there are specific enumerators built in for IPv6. It's still in it's infancy so I'm looking for feedback in the hopes to make it more robust. Feel free to check it out and let me know what you think.

On a personal note, my guitarist and I have found a new bass player and are starting to work on some new music. Although it is a bit of a pain to start from scratch, we're really enjoying the process. We know we're not the next Metallica or Megadeth and we're all just doing this for fun. Seeing as we're starting anew, it's good to just take it slowly and enjoy the ride.

With the help of Champix, I've quit smoking but have packed on a few extra holiday pounds; A worthy trade in my opinion. I'm reorganizing my schedules so that I'll always have time to hit the gym at least once a day and will be planning out extra healthy meals for the week. Seeing as my wife and I were gifted an InstantPot for the holidays, I'm pretty excited for this part of my life - It's been far too long.

I've come to the realization that there are a lot of things I want to accomplish but not a lot of time to do them in. The next year will bring in a more regimented person geared toward even more good things. I hope to help people out as much as I can with the knowledge that I have to pass on and be the best me I can. I hope the same holds true for you.

Gr@ve_Rose 

Friday, 23 August 2019

tcpdump101.com - Version 1.01 Released

Just a few small updates for this version:

  • Check Point friendly 'fw monitor' (featured in R80.20 JHF73+) is now supported. When selecting 'fw monitor' you will be prompted to choose which version you want to build with.
  • Updated the "Static Routes" area for the Cisco ASA IPv6 route addition and deletion which now function properly.
Happy Packet Hunting!

Gr@ve_Rose

Wednesday, 26 June 2019

tcpdump101.com - Version 1.0.250619 Released

Wow... It's been a long time that was in development but I'm proud to announce that the newest version has been brought into production! Here are the new features in this release:

  • Splash page has been removed and replaced with a "home" page.
  • Menu bar on the left has been improved.
  • Error checking is now colour-coded (Green is good, Yellow is suspect and Red is an error).
  • All options now have inline contextual help by hovering over the question mark icon.
  • All select options and titles can be clicked on anywhere instead of just on the button or words.
  • All filter options have been ordered following the OSI model.
  • You can now add filters above and below other filters - No need to stack then at the bottom any more.
  • There is a "Back to Top" button which will show up if you scroll down far enough.
  • The command bar at the top will always be visible at the top regardless of how far you scroll.
  • The "Copy Command" button has been removed as you can now click on the top bar to copy the command.
  • A new floating right-hand menu is present for copying the commands or starting again. This is where the rubbish bin icon has moved to.
  • Using the "not" option in filters will now show an inverted icon in the filter box for ease of spotting negated filters.
  • There is a new command-line interface section which will continuously be expanded for common platform commands.
  • There is a new link to join the Discord channel.
  • There is a new RSS feed link for people who want to subscribe.
  • The download section now has a quick copy 'n paste "wget" command to download the tool for offline use.
Whether you want to drop me a line telling me you like it, if you've found a bug or if you have any suggestions to improve this, all feedback is welcomed.

Happy Packet Hunting!

Gr@ve_Rose

Tuesday, 11 December 2018

dev.tcpdump101.com - December 10, 2018

A lot (!) of new features coming along and more up on deck. As of the build pushed today, here are some of the highlights:


  • You can add filters above and below other filters.
  • New CSS.
  • The top command bar is now sticky and will follow you when you scroll.
  • There is a "back to top" button for when you do scroll down.
  • Colour-coded boxes give you immediate feedback on your input. Green is good, yellow is suspect and red is invalid.
  • Checkmarks, exclamation points and crosses also denote that status of your input.
  • Some (but not all) filter validation is done. 
  • You can now click on the copy button on the right to copy or you can just click anywhere in the top command bar to copy the command.
  • The rubbish bin has been moved to the right (with the copy button) so that you're always close to it when creating/editing your filters.
  • A small icon will appear on the top-right corner of any filters you have negated (selected the "not" option).
I'm always looking for feedback so join me on Twitter at https://twitter.com/Grave_Rose or on the sub-Reddit at https://www.reddit.com/r/tcpdump101 and let me know what you think.

Happy Packet Hunting!

Gr@ve_Rose

Thursday, 18 October 2018

dotPCap - ep0: The how and why of packet captures

If you know me in real life, you're probably sick of me talking about packet captures and why they're the best thing since sliced bread. If you don't know me in real life, you'll probably be sick of me talking about packet captures being the best thing since sliced bread by the end of this document.

But if you're like me, you'll understand. And that's what I'm here to do - Help people understand, learn and become better.

Why Packet Captures?


Packet captures (PCaps) are your new best friend... But why? Here's where I've seen PCaps help out and I'll expand on each of these afterwards:

  • Network Engineering (Net/Eng)
  • Network Security (Net/Sec)
  • Application Development and Support (Devops)
  • Server Management (Sysadmin)

Net/Eng

Net/Eng and Net/Sec are the two areas I spend most (if not all) of my time in. I've invested over twenty years in these two fields and once I found out how useful packet captures are, I've never looked back. In my (not so) humble opinion, Net/Eng benefits the most from packet captures since they will always show you where your network problems are. Let me repeat that, bold it and stick it in the middle so that you don't miss it:

Packet captures will always show you where your network problems are.

You might say that's quite the bold statement (pun totally intended) to make. My reply is that it is a bold statement and I'll stand behind it. We'll be doing a nice deep-dive on this aspect later.

Net/Sec

As I mentioned before, I do a fair amount of work in the Net/Sec space as well. While most of the time in Net/Sec, we think of active attacks, Pen Testing and red team activities, there's passive recon which can provide some good information on our targets as well. There are a lot of excellent tools out there which can do the job for us and gather information however I feel that you should know why you're looking at something, not just what you're looking at.

DevOps

While I don't do a lot of DevOps myself, I work along side of application developers who are great at what they do. What (some of them) aren't that great at, is understanding the network components and connectivity. If you're programming a network-connected application, using packet captures will help you not only understand what's being sent across the wire, but also help you troubleshoot and debug your application from a network point of view.

Sysadmin

System administrators can benefit from packet captures as well both from an information perspective as well as a troubleshooting perspective. Let's say you're in charge of a server and want to know what is being sent out of the system for security purposes, you can use packet captures to examine what your server is sending out. From there, you can track down any offending application and deal with it. Packet captures are useful in service troubleshooting when something's not working leading to more information combined with service debugs as well as host-based firewall rules.

Deep Dive into Packet Hunting

Now that we have a rough idea of why we use packet captures, let's get our hands dirty and start looking into some examples of how packet captures are your new best friend. In these examples, I will be focusing on IPv4 to keep this document accessible however the concepts are the same with IPv6 with the following differences present in this document:

  • IPv4 uses Address Resolution Protocol (ARP) to bridge Layer-2 and Layer-3 using broadcast packets)whereas IPv6 uses Neighbour Discovery (ICMP) and multicast packets.
  • IPv4 uses 32-bit addressing whereas IPv6 uses 128-bit addressing.
Let's start with something simple. Take a look at the following (extremely basic) network diagram:



It's hard to get more basic than this. Here we have a webserver (10.20.30.40) directly connected (no switch) to a firewall (10.20.30.254). On the other side of the firewall we have another network where the firewall has 1.2.3.254 and a client using 1.2.3.4 as their IP address. Although not seen in the screenshot, we're using a /24 (255.255.255.0) subnet mask for both networks and that our webserver is running on the standard TCP/80 port. We're also not concerned with DNS resolution for now. Our objective is to have the client connect through the firewall to the webserver to load a page with a funny cat picture. 'Cause why not?

What Should Happen if Everything is Configured Properly

Let's get our microscopes out and really dig into this. Yes, this is pretty long but it's very (!) important to understand. Here's what should happen:
  1. The client application (web browser) says that it needs to create a TCP connection so it talks with the operating system of the client to create a socket. This socket is a file which provides the application to use lower-level functions of the OS such as networking.
  2. The application then tries to communicate with the webserver at 10.20.30.40 and now the operating system takes over.
  3. The OS receives a request to create a TCP connection to 10.20.30.40:80 so what does it do? Let's go one level deeper:
    • If the packet is a TCP or UDP packet (in our case it is TCP/80), the OS will use a random high source-port (called ephemeral ports) above 1024 and below 65535 to use for the communication.
    • Then the OS will check (usually in this order) the destination route: Connected, Static Routes, Dynamic Routes, Default Gateway and No Match. Here's what each means:
      1. Connected: If I'm on the same subnet, I'm connected so I'll send out an ARP (IPv4) or ND (IPv6) request.
      2. Static: If I'm not on the same subnet, do I have a static route that tells me which gateway to use, if so, I'll use that.
      3. Dynamic: Do I participate in OSPF, BGP, RIP or other dynamic protocol which tells me which gateway to use? If I do and have a matching route, I'll use that gateway.
      4. Default Gateway: Do I have a default gateway? If so, I'll send the packet there.
      5. No Match: If I don't have any matching gateways to use, I'll drop the packet and (hopefully) send the user a message about no route to host/net.
  4. Once the OS has matched the route (assuming there is one), it will send it to it's gateway. How does it know how to send it to the gateway? With ARP (IPv4) or ND (IPv6). Yet again, let's go deeper:
    • Apart from Software Defined Networks, gateways for devices should (must?) be on the same subnet otherwise, the client won't be able to ARP/ND for it. Since our client is 1.2.3.4/24 and our gateway is 1.2.3.254/24, they're on the same subnet.
    • Since they're on the same subnet, the client will send out an ARP request (destination MAC address of FF:FF:FF:FF:FF:FF [Layer-2 broadcast]) asking "arp who-has 1.2.3.254 tell 1.2.3.4".
    • The firewall (who rightfully owns this IP address) will reply back with a unicast "arp reply 1.2.3.254 is at 00:01:02:03:04:05".
    • Now that the ARP request is done, we have bridged Layer-2 and Layer-3 together.
  5. The client will now send the packet (in our case a TCP/SYN) to the gateway (the firewall) where the gateway starts the process again from Step 3. This time, however, we are connected so we use step 3.1 and just ARP for 10.20.30.40.
  6. The firewall, after the ARP negotiation, now has knowledge of 10.20.30.40 on it's connected interface so it will send the SYN packet to the server.
  7. Since TCP/80 is in a LISTEN state on the webserver, it will process the packet and reply with a SYN/ACK packet. At this point, we repeat the entire process again from Step 3 so that the server can reply to the client.
  8. Since this is the "what should happen" scenario, the SYN/ACK is received by the client who then replies with an ACK packet to the server.
  9. We now have a successful TCP session between the client and server so we then move up the stack where the server uses it's LISTEN socket (changed now to ESTABLISHED) and sends data to the application - In this case, the application is the webserver service (apache, tomcat, etc) which process the HTTP transaction.
Keep in mind that every time a packet needs to go somewhere, all the networking steps are repeated with one major exception: ARP/ND has a cache inside an operating system which lasts for a certain amount of time. This means that if the OS already has an ARP/ND entry for a connected host, it won't waste time sending out another ARP/ND request. If the cache has expired or the entry deleted then the ARP/ND process will have to repeat.

Well... That was a mouthful. Let's look at it again but this time with happy little pictures to make things a little easier to digest. :) The client will be in red, the firewall in blue and the server in green.


Keep in mind that this happens every time a packet needs to cross a routing device (with the exception of ARP/ND cache).

Below are actual packet captures to illustrate what has actually happened. Just note that the time on all three machines is a little off so the timestamps may appear to be from the future:

Client sends an ARP request for 1.2.3.254 - Take note of the destination MAC address being the Layer-2 broadcast address:
11:44:11.990523 0a:00:27:00:00:00 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Ethernet (len 6), IPv4 (len 4), Request who-has 1.2.3.254 tell 1.2.3.4, length 28
        0x0000:  0001 0800 0604 0001 0a00 2700 0000 0102  ..........'.....
        0x0010:  0304 0000 0000 0000 0102 03fe                    ............

The firewall sees this ARP request and the replies to it. Again, pay attention to the Layer-2 address as the firewall will only reply to the requestor:
11:44:10.573901 0a:00:27:00:00:00 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Ethernet (len 6), IPv4 (len 4), Request who-has 1.2.3.254 tell 1.2.3.4, length 46
0x0000:  0001 0800 0604 0001 0a00 2700 0000 0102  ..........'.....
0x0010:  0304 0000 0000 0000 0102 03fe 0000 0000  ................
0x0020:  0000 0000 0000 0000 0000 0000 0000          ..............
11:44:10.573915 08:00:27:09:fb:93 > 0a:00:27:00:00:00, ethertype ARP (0x0806), length 42: Ethernet (len 6), IPv4 (len 4), Reply 1.2.3.254 is-at 08:00:27:09:fb:93, length 28
0x0000:  0001 0800 0604 0002 0800 2709 fb93 0102  ..........'.....
0x0010:  03fe 0a00 2700 0000 0102 0304                    ....'.......

The client receives the ARP tell:
11:44:11.990707 08:00:27:09:fb:93 > 0a:00:27:00:00:00, ethertype ARP (0x0806), length 60: Ethernet (len 6), IPv4 (len 4), Reply 1.2.3.254 is-at 08:00:27:09:fb:93, length 46
        0x0000:  0001 0800 0604 0002 0800 2709 fb93 0102  ..........'.....
        0x0010:  03fe 0a00 2700 0000 0102 0304 0000 0000  ....'...........
        0x0020:  0000 0000 0000 0000 0000 0000 0000          ..............

Once received, the client sends the first SYN packet. Notice the destination MAC address is that of the firewall:
11:44:11.990713 0a:00:27:00:00:00 > 08:00:27:09:fb:93, ethertype IPv4 (0x0800), length 74: (tos 0x10, ttl 64, id 34414, offset 0, flags [DF], proto TCP (6), length 60)
    1.2.3.4.39308 > 10.20.30.40.80: Flags [S], cksum 0x8dda (correct), seq 407892468, win 29200, options [mss 1460,sackOK,TS val 1669018 ecr 0,nop,wscale 7], length 0
        0x0000:  4510 003c 866e 4000 4006 87fc 0102 0304  E..<.n@.@.......
        0x0010:  0a14 1e28 998c 0050 184f f1f4 0000 0000    ...(...P.O......
        0x0020:  a002 7210 8dda 0000 0204 05b4 0402 080a  ..r.............
        0x0030:  0019 779a 0000 0000 0103 0307                   ..w.........

The firewall receives this packet from the client:
11:44:10.574019 0a:00:27:00:00:00 > 08:00:27:09:fb:93, ethertype IPv4 (0x0800), length 74: (tos 0x10, ttl 64, id 34414, offset 0, flags [DF], proto TCP (6), length 60)
    1.2.3.4.39308 > 10.20.30.40.80: Flags [S], cksum 0x8dda (correct), seq 407892468, win 29200, options [mss 1460,sackOK,TS val 1669018 ecr 0,nop,wscale 7], length 0
0x0000:  4510 003c 866e 4000 4006 87fc 0102 0304  E..<.n@.@.......
0x0010:  0a14 1e28 998c 0050 184f f1f4 0000 0000    ...(...P.O......
0x0020:  a002 7210 8dda 0000 0204 05b4 0402 080a  ..r.............
0x0030:  0019 779a 0000 0000 0103 0307                    ..w.........

After the firewall checks it's routing table, it knows that it has to send it out the other interface. Since the destination is a connected network, we send out another ARP request:
11:43:54.534937 08:00:27:ea:2e:72 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Ethernet (len 6), IPv4 (len 4), Request who-has 10.20.30.254 tell 10.20.30.40, length 46
0x0000:  0001 0800 0604 0001 0800 27ea 2e72 0a14  ..........'..r..
0x0010:  1e28 0000 0000 0000 0a14 1efe 0000 0000  .(..............
0x0020:  0000 0000 0000 0000 0000 0000 0000         ..............

The server receives it:
11:43:54.365615 08:00:27:4e:2d:4e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Ethernet (len 6), IPv4 (len 4), Request who-has 10.20.30.40 tell 10.20.30.254, length 46
0x0000:  0001 0800 0604 0001 0800 274e 2d4e 0a14  ..........'N-N..
0x0010:  1efe 0000 0000 0000 0a14 1e28 0000 0000  ...........(....
0x0020:  0000 0000 0000 0000 0000 0000 0000       ..............

And the reply is sent from the server:
11:43:54.365971 08:00:27:4e:2d:4e > 08:00:27:ea:2e:72, ethertype ARP (0x0806), length 60: Ethernet (len 6), IPv4 (len 4), Reply 10.20.30.254 is-at 08:00:27:4e:2d:4e, length 46
0x0000:  0001 0800 0604 0002 0800 274e 2d4e 0a14  ..........'N-N..
0x0010:  1efe 0800 27ea 2e72 0a14 1e28 0000 0000  ....'..r...(....
0x0020:  0000 0000 0000 0000 0000 0000 0000       ..............

And the firewall receives it:
11:43:54.534971 08:00:27:4e:2d:4e > 08:00:27:ea:2e:72, ethertype ARP (0x0806), length 42: Ethernet (len 6), IPv4 (len 4), Reply 10.20.30.254 is-at 08:00:27:4e:2d:4e, length 28
0x0000:  0001 0800 0604 0002 0800 274e 2d4e 0a14  ..........'N-N..
0x0010:  1efe 0800 27ea 2e72 0a14 1e28                      ....'..r...(

The firewall then takes the original SYN packet and sends it to the server:
11:44:10.574026 08:00:27:4e:2d:4e > 08:00:27:ea:2e:72, ethertype IPv4 (0x0800), length 74: (tos 0x10, ttl 63, id 34414, offset 0, flags [DF], proto TCP (6), length 60)
    1.2.3.4.39308 > 10.20.30.40.80: Flags [S], cksum 0x8dda (correct), seq 407892468, win 29200, options [mss 1460,sackOK,TS val 1669018 ecr 0,nop,wscale 7], length 0
0x0000:  4510 003c 866e 4000 3f06 88fc 0102 0304  E..<.n@.?.......
0x0010:  0a14 1e28 998c 0050 184f f1f4 0000 0000  ...(...P.O......
0x0020:  a002 7210 8dda 0000 0204 05b4 0402 080a  ..r.............
0x0030:  0019 779a 0000 0000 0103 0307                   ..w.........

And the server receives it:
11:44:10.405495 08:00:27:4e:2d:4e > 08:00:27:ea:2e:72, ethertype IPv4 (0x0800), length 74: (tos 0x10, ttl 63, id 34414, offset 0, flags [DF], proto TCP (6), length 60)
    1.2.3.4.39308 > 10.20.30.40.80: Flags [S], cksum 0x8dda (correct), seq 407892468, win 29200, options [mss 1460,sackOK,TS val 1669018 ecr 0,nop,wscale 7], length 0
0x0000:  4510 003c 866e 4000 3f06 88fc 0102 0304  E..<.n@.?.......
0x0010:  0a14 1e28 998c 0050 184f f1f4 0000 0000  ...(...P.O......
0x0020:  a002 7210 8dda 0000 0204 05b4 0402 080a  ..r.............
0x0030:  0019 779a 0000 0000 0103 0307                    ..w.........

Since the port is open and there is no firewalling involved, the server sends a SYN/ACK packet. Take a look at the ACK number which is the Initial Sequence Number (ISN) 407892468+1 (407892469):
11:44:10.405548 08:00:27:ea:2e:72 > 08:00:27:4e:2d:4e, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.20.30.40.80 > 1.2.3.4.39308: Flags [S.], cksum 0x2c70 (incorrect -> 0x88ca), seq 74455689, ack 407892469, win 28960, options [mss 1460,sackOK,TS val 2206557040 ecr 1669018,nop,wscale 7], length 0
0x0000:  4500 003c 0000 4000 4006 0e7b 0a14 1e28  E..<..@.@..{...(
0x0010:  0102 0304 0050 998c 0470 1a89 184f f1f5  .....P...p...O..
0x0020:  a012 7120 2c70 0000 0204 05b4 0402 080a  ..q.,p..........
0x0030:  8385 6370 0019 779a 0103 0307                   ..cp..w.....

The firewall receives this packet on it's interface and routes it back toward the client on the other interface:
11:44:10.574245 08:00:27:ea:2e:72 > 08:00:27:4e:2d:4e, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.20.30.40.80 > 1.2.3.4.39308: Flags [S.], cksum 0x88ca (correct), seq 74455689, ack 407892469, win 28960, options [mss 1460,sackOK,TS val 2206557040 ecr 1669018,nop,wscale 7], length 0
0x0000:  4500 003c 0000 4000 4006 0e7b 0a14 1e28  E..<..@.@..{...(
0x0010:  0102 0304 0050 998c 0470 1a89 184f f1f5  .....P...p...O..
0x0020:  a012 7120 88ca 0000 0204 05b4 0402 080a  ..q.............
0x0030:  8385 6370 0019 779a 0103 0307                   ..cp..w.....

And:
11:44:10.574249 08:00:27:09:fb:93 > 0a:00:27:00:00:00, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.20.30.40.80 > 1.2.3.4.39308: Flags [S.], cksum 0x88ca (correct), seq 74455689, ack 407892469, win 28960, options [mss 1460,sackOK,TS val 2206557040 ecr 1669018,nop,wscale 7], length 0
0x0000:  4500 003c 0000 4000 3f06 0f7b 0a14 1e28  E..<..@.?..{...(
0x0010:  0102 0304 0050 998c 0470 1a89 184f f1f5  .....P...p...O..
0x0020:  a012 7120 88ca 0000 0204 05b4 0402 080a  ..q.............
0x0030:  8385 6370 0019 779a 0103 0307                   ..cp..w.....

Whereby the client receives it and then ACK's the second SYN flag:
11:44:11.991079 08:00:27:09:fb:93 > 0a:00:27:00:00:00, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    10.20.30.40.80 > 1.2.3.4.39308: Flags [S.], cksum 0x88ca (correct), seq 74455689, ack 407892469, win 28960, options [mss 1460,sackOK,TS val 2206557040 ecr 1669018,nop,wscale 7], length 0
        0x0000:  4500 003c 0000 4000 3f06 0f7b 0a14 1e28  E..<..@.?..{...(
        0x0010:  0102 0304 0050 998c 0470 1a89 184f f1f5  .....P...p...O..
        0x0020:  a012 7120 88ca 0000 0204 05b4 0402 080a  ..q.............
        0x0030:  8385 6370 0019 779a 0103 0307                   ..cp..w.....
11:44:11.991149 0a:00:27:00:00:00 > 08:00:27:09:fb:93, ethertype IPv4 (0x0800), length 66: (tos 0x10, ttl 64, id 34415, offset 0, flags [DF], proto TCP (6), length 52)
    1.2.3.4.39308 > 10.20.30.40.80: Flags [.], cksum 0x27d2 (correct), seq 1, ack 1, win 229, options [nop,nop,TS val 1669018 ecr 2206557040], length 0
        0x0000:  4510 0034 866f 4000 4006 8803 0102 0304  E..4.o@.@.......
        0x0010:  0a14 1e28 998c 0050 184f f1f5 0470 1a8a  ...(...P.O...p..
        0x0020:  8010 00e5 27d2 0000 0101 080a 0019 779a  ....'.........w.
        0x0030:  8385 6370                                                       ..cp

Now that we have the three-way TCP handshake completed, we can send data. For this testing, I just typed the word "Hello". See if you can find it in the ASCII output:
11:44:13.251291 0a:00:27:00:00:00 > 08:00:27:09:fb:93, ethertype IPv4 (0x0800), length 73: (tos 0x10, ttl 64, id 34416, offset 0, flags [DF], proto TCP (6), length 59)
    1.2.3.4.39308 > 10.20.30.40.80: Flags [P.], cksum 0xf8a8 (correct), seq 1:8, ack 1, win 229, options [nop,nop,TS val 1669333 ecr 2206557040], length 7: HTTP
        0x0000:  4510 003b 8670 4000 4006 87fb 0102 0304  E..;.p@.@.......
        0x0010:  0a14 1e28 998c 0050 184f f1f5 0470 1a8a  ...(...P.O...p..
        0x0020:  8018 00e5 f8a8 0000 0101 080a 0019 78d5  ..............x.
        0x0030:  8385 6370 4865 6c6c 6f0d 0a                       ..cpHello..

--I'm going to skip ahead and gloss over the firewall portion now since we've demonstrated how it works--

The server receives the packet and then acknowledges it:
11:44:11.666867 08:00:27:4e:2d:4e > 08:00:27:ea:2e:72, ethertype IPv4 (0x0800), length 73: (tos 0x10, ttl 63, id 34416, offset 0, flags [DF], proto TCP (6), length 59)
    1.2.3.4.39308 > 10.20.30.40.80: Flags [P.], cksum 0xf8a8 (correct), seq 1:8, ack 1, win 229, options [nop,nop,TS val 1669333 ecr 2206557040], length 7: HTTP
0x0000:  4510 003b 8670 4000 3f06 88fb 0102 0304  E..;.p@.?.......
0x0010:  0a14 1e28 998c 0050 184f f1f5 0470 1a8a  ...(...P.O...p..
0x0020:  8018 00e5 f8a8 0000 0101 080a 0019 78d5  ..............x.
0x0030:  8385 6370 4865 6c6c 6f0d 0a                        ..cpHello..
11:44:11.666943 08:00:27:ea:2e:72 > 08:00:27:4e:2d:4e, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 53412, offset 0, flags [DF], proto TCP (6), length 52)
    10.20.30.40.80 > 1.2.3.4.39308: Flags [.], cksum 0x2c68 (incorrect -> 0x21a5), seq 1, ack 8, win 227, options [nop,nop,TS val 2206558301 ecr 1669333], length 0
0x0000:  4500 0034 d0a4 4000 4006 3dde 0a14 1e28  E..4..@.@.=....(
0x0010:  0102 0304 0050 998c 0470 1a8a 184f f1fc  .....P...p...O..
0x0020:  8010 00e3 2c68 0000 0101 080a 8385 685d  ....,h........h]
0x0030:  0019 78d5                                                       ..x.

Notice that the ACK packet contains the same sequence sent in the "Hello" packet (8). TCP is an error correcting protocol. If the ACK value was (4) then the client knows that four bytes were not received and will be sent in the next packet.

To close the connection, our client sends a FIN packet which is then FIN/ACK'd by the server. The following three packets are only shown from the client side to keep this a bit shorter:
11:44:14.415770 0a:00:27:00:00:00 > 08:00:27:09:fb:93, ethertype IPv4 (0x0800), length 66: (tos 0x10, ttl 64, id 34417, offset 0, flags [DF], proto TCP (6), length 52)
    1.2.3.4.39308 > 10.20.30.40.80: Flags [F.], cksum 0x207f (correct), seq 8, ack 1, win 229, options [nop,nop,TS val 1669624 ecr 2206558301], length 0
        0x0000:  4510 0034 8671 4000 4006 8801 0102 0304  E..4.q@.@.......
        0x0010:  0a14 1e28 998c 0050 184f f1fc 0470 1a8a  ...(...P.O...p..
        0x0020:  8011 00e5 207f 0000 0101 080a 0019 79f8  ..............y.
        0x0030:  8385 685d                                                     ..h]
11:44:14.417944 08:00:27:09:fb:93 > 0a:00:27:00:00:00, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 63, id 53413, offset 0, flags [DF], proto TCP (6), length 52)
    10.20.30.40.80 > 1.2.3.4.39308: Flags [F.], cksum 0x1bf3 (correct), seq 1, ack 9, win 227, options [nop,nop,TS val 2206559466 ecr 1669624], length 0
        0x0000:  4500 0034 d0a5 4000 3f06 3edd 0a14 1e28  E..4..@.?.>....(
        0x0010:  0102 0304 0050 998c 0470 1a8a 184f f1fd  .....P...p...O..
        0x0020:  8011 00e3 1bf3 0000 0101 080a 8385 6cea  ..............l.
        0x0030:  0019 79f8                                                      ..y.
11:44:14.418039 0a:00:27:00:00:00 > 08:00:27:09:fb:93, ethertype IPv4 (0x0800), length 66: (tos 0x10, ttl 64, id 34418, offset 0, flags [DF], proto TCP (6), length 52)
    1.2.3.4.39308 > 10.20.30.40.80: Flags [.], cksum 0x1bf0 (correct), seq 9, ack 2, win 229, options [nop,nop,TS val 1669625 ecr 2206559466], length 0
        0x0000:  4510 0034 8672 4000 4006 8800 0102 0304  E..4.r@.@.......
        0x0010:  0a14 1e28 998c 0050 184f f1fd 0470 1a8b  ...(...P.O...p..
        0x0020:  8010 00e5 1bf0 0000 0101 080a 0019 79f9  ..............y.
        0x0030:  8385 6cea                                                       ..l.


When It Doesn't Work

This is why we're here. If it doesn't work, we need to figure out why. There are a lot of parts in this simple example but where do we start? We start at the first point we are able to capture packets. In this example, let's say we control all three items in the equation: The client, the firewall and the server. From a networking perspective, the first thing we need to look at is the ARP request from the client. Assuming the network interface is eth0 on the client, here's what I would run:
tcpdump -nn -vvv -e -s 0 -X -c 100 -i eth0 arp
Let's break this down a bit:
  • tcpdump - This is the command to run.
  • -nn - Do not resolve hostnames or service names. This will change alice.http to 1.2.3.4.80
  • -vvv - Be as verbose as possible.
  • -e - Print the Ethernet headers in the packet
  • -s 0 - Set the snaplength of the capture to all 65535 bytes.
  • -X - Print hexadecimal output on the left and ASCII output on the right.
  • -c 100 - Capture 100 matching packets and then stop.
  • -i eth0 - Capture on the interface named eth0
  • arp - This is our first filter we've encountered. This tells tcpdump to only capture packets which are ARP packets and ignore any other packets going across this interface. Since ARP will match the who-has and the tell, both of which we're interested in to start with, this is the filter we want to use.
Now that we have our filter in place, what are we looking for? We're looking for the output of "what should happen" and compare it with what we know. What should happen in this situation? 
  • The client should send out an ARP who-has packet.
  • The firewall should send out an ARP tell packet.
If the client doesn't send out an ARP who-has packet, what could some of the causes be for this? 
  • Maybe the client has the MAC address in its ARP cache. So let's check that with "arp -na | grep 1.2.3.254" on the client machine. If there is a matching (and correct) entry, then there's no reason for the client to ARP for the gateway.
  • If there's no ARP cache entry, then there's a problem with the configuration on the machine. Check the routes with "netstat -nr" to ensure that the client has both a valid routing table and that there is a matching route for our destination (or, at least, a default gateway).
  • If the routing is in place and there is no ARP cache on the machine, then there is a breakdown before the NIC is involved and we know that our first point of investigation is the client machine itself.
BAM! Packet captures have now just told you where the (first) problem is with your network and packets didn't even leave the machine. How's that for you? :)

Okay, but what if the ARP request goes out the NIC and it's still not working? Glad you asked. Take a look and see if you get an ARP reply. If there is no ARP reply, then there's an issue with either the intermediary connection between the client and server (in this case, a cable) or there's an issue with the firewall. So let's look there next...

We'd log on to the firewall at this point and run the same command with the same "arp" filter. We're going to have one of two outcomes (you'll hear this a lot throughout the document):
  • We see the ARP request come in or
  • We won't see the ARP request come in.
That's it. If we don't see the ARP request come in but we see it leaving the client, then the most likely culprit is the intermediary device. But if we see the ARP request come in to the firewall, what should we be looking for next? The "arp-tell" coming from the firewall back to the client. Again, with our packet capture running, we're going to have one of two outcomes:
  • The firewall responds to the ARP request or
  • It doesn't.
If it doesn't reply to the ARP request, there's likely a configuration issue on the firewall. BAM! Just found another potential issue and investigation point. If it does reply but we don't see that on the client, the issue is with any intermediary device. BAM! Problem solved (so far).

Tangent Number One

I feel now is a good time to break off into a non-technical note about troubleshooting and getting things fixed. A lot (!) of times working in Net/Eng I've come across people who will be very stubborn when accepting that a device they control could be problematic. How many times have you heard this:
"It can't be my device since it's configured properly. It has to be an issue with the firewall so you need to fix it."
I'm guessing you have heard this more times than you care to count. Even more so when it turns out that their device was the issue. The problem is that people want to pass the buck and either (or both) not do the work or seem like they're the problem. 


The issue with this mentality is that nothing will ever get solved. I'll be brutally honest here - If I've screwed up, I will accept the fault and move on with the learning experience. If I'm wrong, that's okay. If I have a professional disagreement with a colleague, we'll still go for coffee afterwards. But one thing I won't do, is pawn off work to other people until I've proven that my device isn't the issue. Here's my troubleshooting mantra:
"I assume the problem is mine and it's my job to prove it's not my problem."
By doing this, I accomplish a few things:

  • I will validate whether or not this is a legitimate networking issue (using packet captures) and fix it if it is. At this point, you've identified the (first) issue and can start working on fixing the issue.
  • I look good in front of customers. Seriously, this is a valid point. :)
  • If it's not a networking issue, I have concrete proof that the issue is (currently) not one of my devices I control. Maybe it will be later in the flow, but right now, it's not.
Look at that last point again. I can take my packet captures, send them out over e-mail and nobody can refute that the packets are passing.

All four fields of technology I mentioned at the start of this document can (and should) adopt the above mantra and take ownership of their part of the troubleshooting process. Things will get fixed faster and less time is wasted when dealing with pure conjecture. 

Back to it...

Now, where were we... Right. We have ARP established between the client and the firewall - Time to move on to our TCP SYN packet. Our client will need to send this packet to the firewall so let's make sure that the packet leaves properly and arrives at the firewall correctly. As per usual, we're going to run a packet capture but this time, just a little different:
tcpdump -nn -vvv -e -s 0 -X -c 100 -i eth0 host 10.20.30.40 and port 80
You'll  see that we now have new filters at the end. The "host 10.20.30.40" tells tcpdump to only capture packets where the IPv4 address is 10.20.30.40 for either the source or destination. We've also stated that we want "port 80" which means that the packet has to have a Layer-4 port (source or destination) as 80. Notice that we used the operand "and" between the two. This logic gate means that both conditions must match for a packet to be captured and displayed.

The same rules as the ARP condition apply however now we're looking for a TCP packet matching our source and destination with the SYN flag set. We need to compare, again, with what should happen versus what we're actually seeing (or not seeing). If we don't see the TCP packet leave even though ARP has been configured properly, there's a problem with the client itself. Maybe there's a host-based firewall preventing our traffic from leaving. Assuming that the packet does, in fact, leave, we need to focus our attention to the next item in our chain, in this case, the firewall.

We can use the exact same packet capture syntax we used above to verify that the TCP packet arrives. Just like everything else, we're going to have one of two outcomes:

  1. The TCP packet arrives or
  2. The TCP packet doesn't arrive.
So if it doesn't arrive at the firewall but leaves the client, the issue is with an intermediary device. How can we be so sure of this? Because we've verified with a packet capture that the packet has left the client but not arrived at the firewall. Something in between is the issue.

Now, if the packet arrives, we're actually going to skip ahead just a little bit by running the same packet capture on the other interface on the firewall (in our example, eth1). We expect to see the packet leaving properly out this interface and, again, we have two possible outcomes:
  1. The TCP packet leaves properly or
  2. The TCP packet doesn't leave properly.
If it leaves properly, we're golden (for now). But if it doesn't, there are a few more things we need to check since we're now dealing with a routing device:
  1. Check for destination routes on the firewall. Using "netstat -nr" you will see where the packet is going to go. If the network is directly connected, your gateway may just be 0.0.0.0 but will list the interface it's going to.
  2. Check for any sort of packet filtering (firewalling) on the device. It is possible that there is a firewall rule preventing the traffic from passing. Take a look at your logs.
  3. If the routing and firewalling are correct, take a look at the ARP table on the firewall to see if 10.20.30.40 is listed there and, if it is, make sure the MAC address lines up with the actual MAC address of the server.
I'm not going to repeat the same steps as before but if traffic isn't passing properly on our firewall and the firewall rules allow the traffic to pass, start back at the ARP troubleshooting and work your way back here. As I've mentioned before, every time a packet goes somewhere, the routing steps are checked which will be followed by ARP and finally, pushing the packet to the next hop. With that being said, let's take a look at our last hop with this direction.

The packet should now be leaving eth1 of the firewall and we can do our packet capture on the web server itself. Again, all the same rules apply as before. The packet checks routing which is now destined for itself so the web server doesn't route it - Instead it will process it. We expect that TCP/80 is in a LISTEN state (check with: netstat -nap | grep LIST | grep -v unix for all Layer-4 socket states and, if you want, pipe it through "grep 80" to get any ports with "80" in their port) and that there are no firewall rules on the web server blocking the traffic. If this is the case and everything works, the socket state will change from LISTEN to SYN_RECEIVED and it will reply back with a SYN/ACK packet. But what if it doesn't...?

Check the log files (/var/log/apache2/error_log for example) of the application, take a look at the firewall rules on the host and the routing on the host to make sure that it's not multi-homed and the return packet is leaving out the incorrect interface.

Once the SYN/ACK is sent and if you're still running your packet captures on the firewall, you should see this SYN/ACK being sent back across both interfaces. If you've stopped your packet captures on the firewall, start them back up (simultaneously would be best) with the filters we spoke about earlier (host 10.20.30.40 and port 80) to capture the return traffic.

Where are we now?

All of this we've just gone through has outlined one of the most basic connections I could write about... We have three boxes (A client, a routing device and a server) all directly connected with a cable (no switches), no Network Address Translation (NAT) and no firewall policies blocking anything. But let's be honest - There is nobody running anything remotely as basic as this. In the real world, we have switches, routers, NAT, PAT, GRE, dynamic routing, route redistribution, IPSec, NAC, wireless and on and on and on...

You may be thinking to yourself: "Gr@ve... When I look at my network or my customers network, it has so many parts to it! How can I use packet captures to troubleshoot something so massive?" Glad you asked. Sometimes, not always, when you encounter large, foreboding networks, they're also messy. A mixture of static routes pushed into dynamic routing protocols, firewalls improperly configured, VSS partially set up and what not. Regardless of the size or complexity of the network, here is the flow chart for you. Remember: There are only ever two outcomes and with this in mind, everything is less daunting.



If you take the most complex, messy or otherwise daunting network, just take your troubleshooting hop-by-hop and you'll start to narrow down where the issues are. When dealing with unicast traffic, you've always got one source going to one destination. Sure, your packets may flow through load balancers or LACP bonded interfaces but when you boil it down, it comes back to one source and one destination.

Where to go From Here

I strongly suggest getting a few Virtual Machines put together (VirtualBox anyone?) and lab out some basic servers. From here, start running packet captures so you can understand what's happening on the wire. Then, break part of the server configuration to see how that affects the network traffic.

One thing I suggest to people is to start by learning one thing really well and then move on to another subject. In our case, ICMP (IP/1) Echo Request and Echo Reply (ping) is probably the simplest to learn. Learn about ICMP Requests and Replies then move on to another ICMP code like Destination Host Unreachable. What does this code represent? In what situations would you see this? How is it different than ICMP Destination Network Unreachable? Once you're comfortable with that, move on to setting up an Apache web server and start learning HTTP. What do the packets look like when everything works? What's the difference between a 403 and a 404? How can you produce these codes and what does it mean for troubleshooting? Now you're in the land of TCP (IP/6) so there are more things to learn at this layer as well - What is MSS? What different TCP flags are there and why would you see an RST instead of a FIN for example?

The other thing people sometimes have issues with is understanding your filters. You need to build your filters according to the situation. If you're troubleshooting a web server which is behind a Static NAT, you'll have to change your "host" filter on the inside from what you're using on the outside. I think we can take a look at that for the next episode.

.plan

https://tcpdump101.com
Twitter: https://twitter.com/Grave_Rose
PayPal: https://www.paypal.me/tcpdump101
Reddit: https://www.reddit.com/r/tcpdump101



Thursday, 30 August 2018

tcpdump101.com - v0.999 Released

A whole new front-end has been designed and implemented for tcpdump101.com. You can still access the old version from the splash page but it is no longer maintained.

Updates include:

  • Completely new front-end interface. The menu has moved to the left instead of the bottom.
  • A splash page showing module status information.
  • Light and Dark themes have been removed but there is a plan to add themes back in.
  • Support for FortiGate "diag debug flow" configuration. Now you can debug FortiGate flows as well.
  • Support for Check Point "fw ctl debug" configuration. Now you can create Check Point kernel debugs as well.
  • Bugfix with "fw monitor" where changing a previously created filter would always update the last syntax regardless of where the filter was changed.
  • Links to my Twitter account, sub Reddit and Paypal now prominent on the left.
  • The "Help" section has been updated with vendor-specific information.
  • A small hoverable status bar on the bottom-left.
  • SSL certificate by Let's Encrypt to ensure that there are no browser warnings about an insecure site.
I've also switched hosting providers and have http://dev.tcpdump101.com configured so people can follow along with the development version as it's being worked on.

Happy Packet Hunting!

Gr@ve_Rose

Monday, 26 September 2016

tcpdump101.com - 0.99-0.6.2 Released

One quick bugfix for http://tcpdump101.com


  • On the ASA capture area, both the "raw-data" and the "ethernet-type" would copy "trace" and "real-time" even though they weren't selected or displayed. I've made the change so that the <span> tags are empty and now get populated when the appropriate checkboxes are checked in. Before they would just change the style.display which left the actual syntax options in for getting copied.
Happy Packet Hunting!

Gr@ve_Rose