Penetration Testing mailing list archives

Re: Packet capture, analysis, regeneration


From: "Nakul Aggarwal" <nakula () gmail com>
Date: Thu, 20 Apr 2006 10:20:11 +0530

search the mailing list archives.
There are a whole lot more and discussions with uses, limitations etc.

regards
On 4/20/06, Ivan . <ivanhec () gmail com> wrote:
Hi Mark,

How about Ethereal, tcpdump and tcpreplay.
You didn't mention the protocol but I'll assume TCP, so you can use
the "Follow TCP Stream" function in Ethereal to reassemble the
packets.

You will have to massage the data manually to get a report out of it though.

Or use NetworkVantage (used to be Ecoscope)
http://www.compuware.com/products/vantage/networkvantage.htm

cheers
Ivan

On 4/18/06, Mark A. Wireman <mwireman () nvisolutions net> wrote:
Has anyone heard of any tools or products that can capture packets, analyze
them, provide a report on the analysis, and then reassemble to show the
content?

What I have been tasked to do is capture the packets that are generated by a
custom application, analyze them in terms of size, utilization, and port,
display a report with the values, and then reassemble them to see if I can
view the content of the entire stream.

Thanks,
Mark



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: