SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Network Programming with          Project




          Narendran Thangarajan
              @naren_live
            PyCon India 2011
Outline
   Why Network Programming
       Network Scanning
   Umit Network Scanner
       Nmap
   Packet Manipulator
       Scapy
       UMPA
                PyPcap
       Creating a new protocol
   Future Directions
”Network is the computer”
                      - Mitch Kapor
Why Network Programming?

   The future of computing is Mobile and Cloud
    Computing.


   With thinner clients and resources getting centralized,
    almost every file access is going to burden the
    network.


   In future, we might reach a point where the loss due to
    a one-minute network failure will cause a loss greater
    than earthquakes or cyclones.
We need data.. Enough data to
  predict a network failure
Network Scanning

   Second of the three data gathering steps.
   Footprinting – Scanning - Enumeration
   Procedure of finding active hosts on the
    network.
   Used for :
       Network Security Assessment
       Purpose of attacking
       Research/Study
Nmap - Backend

   Terminal-based security scanner originally written by
    Gordon Lyon.
   Discovers hosts and services – Creates a ”map”
   Basic Host scanning + determine OS + Names and
    versions of services running in the remote host + type
    of device.
   Examples
Umit Network Scanner – Frontend
   GUI based Network Scanner
   Began as a project for GSoC 2005
   Inspired other scanners like Zenmap
   What could we do?
       Scanning
       Schedule scans
       View Network Topology
       Create Profiles
       Create our own Plugins
Packet Manipulator - Frontend

   Protocol Analyzer
   Can capture packets from any interface
   Decodes the packet based on the protocols
    supported by the backend
Scapy

   Python package for Send, sniff, dissect and
    forge network packets

   Whats so special?
       Create ANY packet
       Flexibility
       Detailed decoding of the received packets
       Fast Packet Design
Scapy - Demo

   Basic Packet construction
   Stacking Layers
   Sending Packets
   Receiving Packets
   Traceroute
   Graph the traces
UMPA – Backend L1

   Umit Manipulation of Packets Art
   Umit's Packet Generation and Manipulation
    Library
   Under Development
   Example : sample.py
Libpcap

   Father of Packet capture libraries
   Implemented in C
   Initially created for tcpdump
   Maintained by tcpdump organization
   Almost all the python packet libraries use
    libpcap as the backend
Future Directions

   Solve Connectivity problems – Internet
    shortages, ISP service blockages.
   A small disconnection could lead to huge
    losses in future.
   Internet Connectivity Monitor
Thus we have networked with Python




  Thank You!!
Queries?




 Email : narendran.thangarajan@gmail.com
 Twitter : naren_live
 Google : Narendran Thangarajan :P

Weitere ähnliche Inhalte

Was ist angesagt?

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
ashishrocks23
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATION
Goutham Royal
 

Was ist angesagt? (20)

Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Overview of IP traceback mechanism
Overview of IP traceback mechanismOverview of IP traceback mechanism
Overview of IP traceback mechanism
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
lOrAwAt Presentation - NOI Hackathon Summer Edition
lOrAwAt Presentation - NOI Hackathon Summer EditionlOrAwAt Presentation - NOI Hackathon Summer Edition
lOrAwAt Presentation - NOI Hackathon Summer Edition
 
An improved ip traceback mechanism for network
An improved ip traceback mechanism for networkAn improved ip traceback mechanism for network
An improved ip traceback mechanism for network
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Network packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisNetwork packet analysis -capture and Analysis
Network packet analysis -capture and Analysis
 
Gluing the iot world (ICT)
Gluing the iot world (ICT)Gluing the iot world (ICT)
Gluing the iot world (ICT)
 
Reports from the field azure functions in practice
Reports from the field   azure functions in practiceReports from the field   azure functions in practice
Reports from the field azure functions in practice
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPN
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATION
 
Firewalls
FirewallsFirewalls
Firewalls
 

Ähnlich wie Network Programming with Umit project

Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
MOHD ARISH
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gv
vgy_a
 

Ähnlich wie Network Programming with Umit project (20)

A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURES
 
Nmap
NmapNmap
Nmap
 
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetupBuilding the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetup
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linux
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analytics
 
RESUME
RESUMERESUME
RESUME
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
Resume 8 Yrs.Exp. c c++,Telecom
Resume 8 Yrs.Exp. c c++,TelecomResume 8 Yrs.Exp. c c++,Telecom
Resume 8 Yrs.Exp. c c++,Telecom
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
 
Timepack deck
Timepack deckTimepack deck
Timepack deck
 
Challenges and experiences with IPTV from a network point of view
Challenges and experiences with IPTV from a network point of viewChallenges and experiences with IPTV from a network point of view
Challenges and experiences with IPTV from a network point of view
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gv
 
Graphical packet generator
Graphical packet generatorGraphical packet generator
Graphical packet generator
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoring
 
Network Design For Alliance Française de Dhaka
Network Design For Alliance Française de DhakaNetwork Design For Alliance Française de Dhaka
Network Design For Alliance Française de Dhaka
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
Nmap & Network sniffing
Nmap & Network sniffingNmap & Network sniffing
Nmap & Network sniffing
 

Mehr von UC San Diego

A primer on network devices
A primer on network devicesA primer on network devices
A primer on network devices
UC San Diego
 
Socket programming in Java (PPTX)
Socket programming in Java (PPTX)Socket programming in Java (PPTX)
Socket programming in Java (PPTX)
UC San Diego
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
UC San Diego
 

Mehr von UC San Diego (20)

A primer on network devices
A primer on network devicesA primer on network devices
A primer on network devices
 
Datacenter traffic demand characterization
Datacenter traffic demand characterizationDatacenter traffic demand characterization
Datacenter traffic demand characterization
 
Smart Homes, Buildings and Internet-of-things
Smart Homes, Buildings and Internet-of-thingsSmart Homes, Buildings and Internet-of-things
Smart Homes, Buildings and Internet-of-things
 
Social Networks analysis to characterize HIV at-risk populations - Progress a...
Social Networks analysis to characterize HIV at-risk populations - Progress a...Social Networks analysis to characterize HIV at-risk populations - Progress a...
Social Networks analysis to characterize HIV at-risk populations - Progress a...
 
eyeTalk - A system for helping people affected by motor neuron problems
eyeTalk - A system for helping people affected by motor neuron problemseyeTalk - A system for helping people affected by motor neuron problems
eyeTalk - A system for helping people affected by motor neuron problems
 
Pirc net poster
Pirc net posterPirc net poster
Pirc net poster
 
Ajaxism
AjaxismAjaxism
Ajaxism
 
Basic terminologies for a developer
Basic terminologies for a developerBasic terminologies for a developer
Basic terminologies for a developer
 
Fields in computer science
Fields in computer scienceFields in computer science
Fields in computer science
 
Understanding computer networks
Understanding computer networksUnderstanding computer networks
Understanding computer networks
 
FOSS Introduction
FOSS IntroductionFOSS Introduction
FOSS Introduction
 
Introduction to Python
Introduction to PythonIntroduction to Python
Introduction to Python
 
Airline reservation system db design
Airline reservation system db designAirline reservation system db design
Airline reservation system db design
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
Socket programming in Java (PPTX)
Socket programming in Java (PPTX)Socket programming in Java (PPTX)
Socket programming in Java (PPTX)
 
Socket programming using java
Socket programming using javaSocket programming using java
Socket programming using java
 
Routing basics
Routing basicsRouting basics
Routing basics
 
Technology Quiz
Technology QuizTechnology Quiz
Technology Quiz
 
Android application development
Android application developmentAndroid application development
Android application development
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Network Programming with Umit project

  • 1. Network Programming with Project Narendran Thangarajan @naren_live PyCon India 2011
  • 2. Outline  Why Network Programming  Network Scanning  Umit Network Scanner  Nmap  Packet Manipulator  Scapy  UMPA PyPcap  Creating a new protocol  Future Directions
  • 3. ”Network is the computer” - Mitch Kapor
  • 4. Why Network Programming?  The future of computing is Mobile and Cloud Computing.  With thinner clients and resources getting centralized, almost every file access is going to burden the network.  In future, we might reach a point where the loss due to a one-minute network failure will cause a loss greater than earthquakes or cyclones.
  • 5. We need data.. Enough data to predict a network failure
  • 6. Network Scanning  Second of the three data gathering steps.  Footprinting – Scanning - Enumeration  Procedure of finding active hosts on the network.  Used for :  Network Security Assessment  Purpose of attacking  Research/Study
  • 7. Nmap - Backend  Terminal-based security scanner originally written by Gordon Lyon.  Discovers hosts and services – Creates a ”map”  Basic Host scanning + determine OS + Names and versions of services running in the remote host + type of device.  Examples
  • 8. Umit Network Scanner – Frontend  GUI based Network Scanner  Began as a project for GSoC 2005  Inspired other scanners like Zenmap  What could we do?  Scanning  Schedule scans  View Network Topology  Create Profiles  Create our own Plugins
  • 9. Packet Manipulator - Frontend  Protocol Analyzer  Can capture packets from any interface  Decodes the packet based on the protocols supported by the backend
  • 10. Scapy  Python package for Send, sniff, dissect and forge network packets  Whats so special?  Create ANY packet  Flexibility  Detailed decoding of the received packets  Fast Packet Design
  • 11. Scapy - Demo  Basic Packet construction  Stacking Layers  Sending Packets  Receiving Packets  Traceroute  Graph the traces
  • 12. UMPA – Backend L1  Umit Manipulation of Packets Art  Umit's Packet Generation and Manipulation Library  Under Development  Example : sample.py
  • 13. Libpcap  Father of Packet capture libraries  Implemented in C  Initially created for tcpdump  Maintained by tcpdump organization  Almost all the python packet libraries use libpcap as the backend
  • 14. Future Directions  Solve Connectivity problems – Internet shortages, ISP service blockages.  A small disconnection could lead to huge losses in future.  Internet Connectivity Monitor
  • 15. Thus we have networked with Python Thank You!!
  • 16. Queries? Email : narendran.thangarajan@gmail.com Twitter : naren_live Google : Narendran Thangarajan :P