“You will learn more from your failures than your successes - so embrace those mistakes, as difficult as that sounds, and grow from them. When a project is successful, you're never really sure why, because so many elements come into play. However, when you fail, you always know why. That is how you learn and grow..” – Lynda Resnick
From the year 1986 network sniffers were introduced to our era of computing. It helped system administrators to investigate and gain better knowledge of networks they were working on. The main reason why packet sniffers are used is to diagnose underlying problems on the network by analyzing network traffic. The functionality of packet sniffer is simply that it monitors traffic and presents results in a human readable format.
However, my goal was to produce a tool that was never seen before by implementing elements of packet sniffing and allow user to perform layer 2 (OSI model) attacks. I can strongly say that I have succeeded and not only that but more than I have expected. This tool is targeted to anyone who has passion in networking and cyber security fields.
Special thanks to my fourth year project supervisor
Paul Barry MSc
for his continuous support and motivation throughout the year.
Below video will show a quick overview of the tool that I created as part my fourth year final project
All below functionality is implemented, was tested and performs described tasks as intended
|Operational network packet sniffer|
|Simple point and click interface|
|Ability to ARP poison chosen target|
|Identify hosts on a network|
|Filter options on a sniffer|
|Application works on multiple platforms (OSX, Linux, Windows)|
|Sniffer translates to domain names|
|Local database to retain queries|
|Scan for opened ports on a given target|
|Export capture files in pcap format|
|Import capture files in pcap format|
|Displays packet information including binary format|
|Ability to perform Denial of Service attack (DoS)|
|Identify if host is active|
|Perform DHCP starvation attack|
|Visual representation of packet captures (Bar and Pie charts)|
Below technologies were used to implement Network Analyser project
My name is Erlandas Bacauskas and I am a fourth year student studying CyberCrime and IT Security in IT Carlow. Cyber crime and security has been my passion for many year's and I hope you enjoy looking at my work as much as I enjoyed doing it.