1. PacketEye 1.0
Java based packet sniffer application
Packet Sniffing by Ramakrishna is licensed under a Creative CommonsAttribution 4.0 International License.
3. Introduction
▪ The information running through networks is a valuable source
of evidence for network administrators to fish out intruders or
anomalous connections.
▪ A Packet Sniffer is a program that can monitor every packet that
crosses the network.
▪ Packet sniffers are network troubleshooting tools that provide a
detailed view of network traffic.
4.
5. Introduction(cont…)
▪ This project’s intention is to develop a tool called PacketEye
(Packet Sniffer).
▪ Purpose of PacketEye project is to analyze ongoing traffic in a
network.
▪ It will help the administrator to examine network system for any
security breaches by observing the IP addresses.
▪ The information that the user can capture includes protocol,
time of capture, source and destination IP, source and
destination MAC, port numbers and the data.
6. How it works
▪ A Packet Eye works by looking at every packet sent in the
network, including packets not intended for itself.
▪ To capture the packets using PacketEye we are setting NIC in
promiscuous mode.
▪ Promiscuous mode causes the controller to pass all the traffic it
receives to the CPU rather than passing only the frames that the
controller is intended to receive.
7. Technologies used
▪ For GUI design we used java awt & swings.
▪ For back-end we have used jpcap library developed in java.
▪ To develop java application using jpcap we have used a third-
party library called WinPcap.
8. Features
▪ Network monitoring for different networks
▪ Storing the captured packet for future references
▪ Retrieving the stored data
▪ Packet filtering
▪ Platform independent GUI
9. Features(cont…)
▪ Exploits information passed in clear text
▪ Protocols that pass information in clear text format are:
▪ Telnet
▪ FTP (File Transfer Protocol)
▪ SNMP (Simple Network Management Protocol)
▪ POP (Post Office Protocol)
11. User Classes
▪ These are the persons/devices that are part of sniffing process
Sender
Receiver
Intruder
Administrator
12. Benefits
▪ Platform independent
▪ It consumes less memory (RAM)
▪ It consumes less hard disk space
▪ Java based GUI for better user experience
▪ Conversion of Network traffic into human readable form
13. TEAM MEMBERS
▪ P. Ayyappa Swamy (N120170)
▪ P. Rama Krishna (N120382)
▪ D. VaraLakshmi (N120155)
▪ K. Mani (N120642)