SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Network Programming with          Project




          Narendran Thangarajan
              @naren_live
            PyCon India 2011
Outline
   Why Network Programming
       Network Scanning
   Umit Network Scanner
       Nmap
   Packet Manipulator
       Scapy
       UMPA
                PyPcap
       Creating a new protocol
   Future Directions
”Network is the computer”
                      - Mitch Kapor
Why Network Programming?

   The future of computing is Mobile and Cloud
    Computing.


   With thinner clients and resources getting centralized,
    almost every file access is going to burden the
    network.


   In future, we might reach a point where the loss due to
    a one-minute network failure will cause a loss greater
    than earthquakes or cyclones.
We need data.. Enough data to
  predict a network failure
Network Scanning

   Second of the three data gathering steps.
   Footprinting – Scanning - Enumeration
   Procedure of finding active hosts on the
    network.
   Used for :
       Network Security Assessment
       Purpose of attacking
       Research/Study
Nmap - Backend

   Terminal-based security scanner originally written by
    Gordon Lyon.
   Discovers hosts and services – Creates a ”map”
   Basic Host scanning + determine OS + Names and
    versions of services running in the remote host + type
    of device.
   Examples
Umit Network Scanner – Frontend
   GUI based Network Scanner
   Began as a project for GSoC 2005
   Inspired other scanners like Zenmap
   What could we do?
       Scanning
       Schedule scans
       View Network Topology
       Create Profiles
       Create our own Plugins
Packet Manipulator - Frontend

   Protocol Analyzer
   Can capture packets from any interface
   Decodes the packet based on the protocols
    supported by the backend
Scapy

   Python package for Send, sniff, dissect and
    forge network packets

   Whats so special?
       Create ANY packet
       Flexibility
       Detailed decoding of the received packets
       Fast Packet Design
Scapy - Demo

   Basic Packet construction
   Stacking Layers
   Sending Packets
   Receiving Packets
   Traceroute
   Graph the traces
UMPA – Backend L1

   Umit Manipulation of Packets Art
   Umit's Packet Generation and Manipulation
    Library
   Under Development
   Example : sample.py
Libpcap

   Father of Packet capture libraries
   Implemented in C
   Initially created for tcpdump
   Maintained by tcpdump organization
   Almost all the python packet libraries use
    libpcap as the backend
Future Directions

   Solve Connectivity problems – Internet
    shortages, ISP service blockages.
   A small disconnection could lead to huge
    losses in future.
   Internet Connectivity Monitor
Thus we have networked with Python




  Thank You!!
Queries?




 Email : narendran.thangarajan@gmail.com
 Twitter : naren_live
 Google : Narendran Thangarajan :P

Weitere ähnliche Inhalte

Was ist angesagt?

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
ashishrocks23
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATION
Goutham Royal
 

Was ist angesagt? (20)

Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Overview of IP traceback mechanism
Overview of IP traceback mechanismOverview of IP traceback mechanism
Overview of IP traceback mechanism
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
lOrAwAt Presentation - NOI Hackathon Summer Edition
lOrAwAt Presentation - NOI Hackathon Summer EditionlOrAwAt Presentation - NOI Hackathon Summer Edition
lOrAwAt Presentation - NOI Hackathon Summer Edition
 
An improved ip traceback mechanism for network
An improved ip traceback mechanism for networkAn improved ip traceback mechanism for network
An improved ip traceback mechanism for network
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Network packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisNetwork packet analysis -capture and Analysis
Network packet analysis -capture and Analysis
 
Gluing the iot world (ICT)
Gluing the iot world (ICT)Gluing the iot world (ICT)
Gluing the iot world (ICT)
 
Reports from the field azure functions in practice
Reports from the field   azure functions in practiceReports from the field   azure functions in practice
Reports from the field azure functions in practice
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPN
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATION
 
Firewalls
FirewallsFirewalls
Firewalls
 

Ähnlich wie Network Programming with Umit project

Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
MOHD ARISH
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gv
vgy_a
 

Ähnlich wie Network Programming with Umit project (20)

A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURES
 
Nmap
NmapNmap
Nmap
 
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetupBuilding the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetup
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linux
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analytics
 
RESUME
RESUMERESUME
RESUME
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
Resume 8 Yrs.Exp. c c++,Telecom
Resume 8 Yrs.Exp. c c++,TelecomResume 8 Yrs.Exp. c c++,Telecom
Resume 8 Yrs.Exp. c c++,Telecom
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
 
Timepack deck
Timepack deckTimepack deck
Timepack deck
 
Challenges and experiences with IPTV from a network point of view
Challenges and experiences with IPTV from a network point of viewChallenges and experiences with IPTV from a network point of view
Challenges and experiences with IPTV from a network point of view
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gv
 
Graphical packet generator
Graphical packet generatorGraphical packet generator
Graphical packet generator
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoring
 
Network Design For Alliance Française de Dhaka
Network Design For Alliance Française de DhakaNetwork Design For Alliance Française de Dhaka
Network Design For Alliance Française de Dhaka
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
Nmap & Network sniffing
Nmap & Network sniffingNmap & Network sniffing
Nmap & Network sniffing
 

Mehr von UC San Diego

A primer on network devices
A primer on network devicesA primer on network devices
A primer on network devices
UC San Diego
 
Socket programming in Java (PPTX)
Socket programming in Java (PPTX)Socket programming in Java (PPTX)
Socket programming in Java (PPTX)
UC San Diego
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
UC San Diego
 

Mehr von UC San Diego (20)

A primer on network devices
A primer on network devicesA primer on network devices
A primer on network devices
 
Datacenter traffic demand characterization
Datacenter traffic demand characterizationDatacenter traffic demand characterization
Datacenter traffic demand characterization
 
Smart Homes, Buildings and Internet-of-things
Smart Homes, Buildings and Internet-of-thingsSmart Homes, Buildings and Internet-of-things
Smart Homes, Buildings and Internet-of-things
 
Social Networks analysis to characterize HIV at-risk populations - Progress a...
Social Networks analysis to characterize HIV at-risk populations - Progress a...Social Networks analysis to characterize HIV at-risk populations - Progress a...
Social Networks analysis to characterize HIV at-risk populations - Progress a...
 
eyeTalk - A system for helping people affected by motor neuron problems
eyeTalk - A system for helping people affected by motor neuron problemseyeTalk - A system for helping people affected by motor neuron problems
eyeTalk - A system for helping people affected by motor neuron problems
 
Pirc net poster
Pirc net posterPirc net poster
Pirc net poster
 
Ajaxism
AjaxismAjaxism
Ajaxism
 
Basic terminologies for a developer
Basic terminologies for a developerBasic terminologies for a developer
Basic terminologies for a developer
 
Fields in computer science
Fields in computer scienceFields in computer science
Fields in computer science
 
Understanding computer networks
Understanding computer networksUnderstanding computer networks
Understanding computer networks
 
FOSS Introduction
FOSS IntroductionFOSS Introduction
FOSS Introduction
 
Introduction to Python
Introduction to PythonIntroduction to Python
Introduction to Python
 
Airline reservation system db design
Airline reservation system db designAirline reservation system db design
Airline reservation system db design
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
Socket programming in Java (PPTX)
Socket programming in Java (PPTX)Socket programming in Java (PPTX)
Socket programming in Java (PPTX)
 
Socket programming using java
Socket programming using javaSocket programming using java
Socket programming using java
 
Routing basics
Routing basicsRouting basics
Routing basics
 
Technology Quiz
Technology QuizTechnology Quiz
Technology Quiz
 
Android application development
Android application developmentAndroid application development
Android application development
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 

Network Programming with Umit project

  • 1. Network Programming with Project Narendran Thangarajan @naren_live PyCon India 2011
  • 2. Outline  Why Network Programming  Network Scanning  Umit Network Scanner  Nmap  Packet Manipulator  Scapy  UMPA PyPcap  Creating a new protocol  Future Directions
  • 3. ”Network is the computer” - Mitch Kapor
  • 4. Why Network Programming?  The future of computing is Mobile and Cloud Computing.  With thinner clients and resources getting centralized, almost every file access is going to burden the network.  In future, we might reach a point where the loss due to a one-minute network failure will cause a loss greater than earthquakes or cyclones.
  • 5. We need data.. Enough data to predict a network failure
  • 6. Network Scanning  Second of the three data gathering steps.  Footprinting – Scanning - Enumeration  Procedure of finding active hosts on the network.  Used for :  Network Security Assessment  Purpose of attacking  Research/Study
  • 7. Nmap - Backend  Terminal-based security scanner originally written by Gordon Lyon.  Discovers hosts and services – Creates a ”map”  Basic Host scanning + determine OS + Names and versions of services running in the remote host + type of device.  Examples
  • 8. Umit Network Scanner – Frontend  GUI based Network Scanner  Began as a project for GSoC 2005  Inspired other scanners like Zenmap  What could we do?  Scanning  Schedule scans  View Network Topology  Create Profiles  Create our own Plugins
  • 9. Packet Manipulator - Frontend  Protocol Analyzer  Can capture packets from any interface  Decodes the packet based on the protocols supported by the backend
  • 10. Scapy  Python package for Send, sniff, dissect and forge network packets  Whats so special?  Create ANY packet  Flexibility  Detailed decoding of the received packets  Fast Packet Design
  • 11. Scapy - Demo  Basic Packet construction  Stacking Layers  Sending Packets  Receiving Packets  Traceroute  Graph the traces
  • 12. UMPA – Backend L1  Umit Manipulation of Packets Art  Umit's Packet Generation and Manipulation Library  Under Development  Example : sample.py
  • 13. Libpcap  Father of Packet capture libraries  Implemented in C  Initially created for tcpdump  Maintained by tcpdump organization  Almost all the python packet libraries use libpcap as the backend
  • 14. Future Directions  Solve Connectivity problems – Internet shortages, ISP service blockages.  A small disconnection could lead to huge losses in future.  Internet Connectivity Monitor
  • 15. Thus we have networked with Python Thank You!!
  • 16. Queries? Email : narendran.thangarajan@gmail.com Twitter : naren_live Google : Narendran Thangarajan :P