[SEEDLAB] NETWORK SECURITY WRITEUP (Packet Sniffing, ICMP Spoof, Traceroute) #4

What the task wants is to compare the results of packet sniffing runned in normal user and root.

First, I wrote sniff.py which prints icmp packets.

When running in root:

When ping is sent to 1.1.1.1, ICMP packet is successfully captured.

When running in normal user:

Operation not permitted error is being printed.

Through the task, I can confirm that packet sniffing requires root permission.

Task 1.2 Spoofing ICMP Packet

The task requires sending to sent spoofed ICMP packet.

I wrote a code that spoofs Src IP to 123.123.123.123 and sends to 192.168.0.12

As a result, Src IP successfully spoofed to 123.123.123.123, and it was sent to 192.168.0.12. However, 123.123.123.123 is a non-existent IP address, and therefore I got “no response found!” in Wireshark.

Task 1.3 Traceroute

The task requires manually implementing traceroute. I wrote a Python code to implement it:

From the above observation, I can find out that it requires 10 ttl to reach 8.8.8.8