[Japanese]
Ethernet packet sniffer
GreedyDog2.4 for Win32 GUI Online Manual
UNYUN <unyun@shadowpenguin.org>
Shadow Penguin Security <http://www.shadowpenguin.org>
Translated by
Kenichi <kenichi@shadowpenguin.org>
This document shows the directions for use in the GreedyDog GUI
mode for Windows2000/Xp. Be sure to read manual.html
(Japanese : manual-ja.html) contained in the
package of GreedyDog before reading this document. |
1. Introduction
The GUI mode which can perform various setup and execution by GUI is
prepared for Windows2000/Xp. GreedyDog(gdd) for Windows2000/Xp
is starts in console mode when gdd is started with a certain option argument.
If the option argument is not specified, gdd starts in GUI mode as shown below.
Fig.1 Main window of GreedyDog GUI mode
2. Main window

A packet capture starts.

A packet capture stops. If GreedyDog is now logging more than one session,
the dialog message "Some connections are still active. Clean up ?"
is shown. If "yes" is chosen, it will close all the session files
compulsorily, and will add them to a log file.

Various log files and a setup of action are performed. Please refer for
details "3. detailed setup window".

gdd can select the source IP address and destination IP address of the
packet for a capture. For example, when you want to carry out the capture
only of the packet transmitted from "192.168.0.3", source IP
address specifies as "192.168.0.3/32." The format of IP address
specification is shown below.
"aaa.bbb.ccc.ddd/mask"
When you want to carry out the capture of the packet transmitted from "192.168.0.*"
(* mean "all"), You specify source IP address as "192.168.0.0/24."

The destination IP address/mask for packet capture. The specifying method
is same as "SRC."

The interface for a packet capture is specified. Since the list of the
IP addresses currently assigned to the network interface is listed, choose
an object interface.

The gdd can specify the TCP port number of the packet for a capture. For
example, if you would like to capture the telnet session, you select port
23. If you divide in a space, you can specify two or more ports. You can specify
65536 combinations of port number in all.
23 512-514
In this example, TCP port 23,512,513,514 are selected to as capture object.
You can specify '-' to select range of port number. And, you can specify
the logfile format to each port. gdd supports four log file format
types shown below.
- Text mode
When the log format is not specified, this mode is selected as a default. This
is compatible with previous version GreedyDog1.x, captured packet is logging
as clear text (not printable characters are not logging).This mode is chosen
when 't' is added to the head of a port number.
(example) t23
- Tag text mode
In this mode, gdd outputs the XML like logfile. In text
mode, the direction information of packet is not logged, but in tag text
mode, the direction information is logged as tag. The not printable characters
are logged as HEX string. This mode is chosen when 'g' is added to the
head of a port number.
(example) g512-514
- HTML text mode
In this mode, gdd outputs the HTML formatted logfile. Direction information
is shown by bold or non-nold. The input packet (packet transmitted from
the client) is written as bold. The not printable characters are not logged.
This mode is chosen when 'h' is added to the head of a port number.
(example) h80
- Binary mode
This is HEX dump text file format mode. The direction information is logged
in the header of each log, all bytes of packet are logged as HEX dump.
This mode is chosen when 'b' is added to the head of a port number.
(example) b22
- Non-filter mode
This is RAW file format. All characters are not filtered, and they are logged
into a logfile.
(example) n80

gdd generates a temporary file for each session(please refer to "3.
detailed setting window."). Usually, the temporary file is deleted
after session is closed. However, if this check box is checked, gdd does
not delete a temporary file.
If this checkbox is checked, the console is
switched to the list view. The temporary files which were generated are
listed on the list view. If the element is double-clicked, the content
of temporary file is shown. If you see the content of temporary file of
tag-text mode, file extension of xml must be associated with Internet
Explorer.

If this check box is checked, gdd outputs all packet dump that fulfills
conditions to a console. It becomes the cause of packet loss when
performing gdd in an environment with much traffic. If you run gdd
in such case, please do not check this check box.

IIf this check box is checked, gdd analyze the sequence number of all
captured packets. When the captured packet
contains spoofed IP address, gdd cancels the packet
by the sequence number check. If this function is not used, gdd will be
deceived by the spoof packet and security issues, such as a forged log
problem and a fake session closing problem, happens. However, this function
is a developmental stage now, and gdd may become unstable if this function
is confirmed by the secure option. When using gdd for a security use, we
recommend you to effective this option. If you use gdd for personal experimentation
or penetration testing purpose, we recommend that you disable this option.
[Note] When
packet capture is started, lights up and blinks the indicator at the upper
right of a main window. A red indicator is turned on when packet capture
is started, a green indicator blinks when a certain IP packet is captured.
If packet capture result is not outputted to a log file, please check
whether the green indicator is blinking first. When not blinking, there
is a possibility that the specified network interface is invalid. In spite
of blinking, but if blinking capture result is not generated to the logfile,
there is a possibility that the address filter or port is invalid.
|

OFF |

ON |
[Note] The
icon of GreedyDog is show in task tray when gdd is started. You can show/hide
the window of GreedyDog by clicking it. |
 |
3. detailed setting window
Fig.2 Detailed setting window
- Logfile
The filename of logfile. ".\log" is selected by default. If you
would like to change it, specify the path of logfile to this edit box.
(example) "c:\gdd\logfile.txt"
- Error Logfile
The filename of error logfile. ".\errlog" is selected by
default. If you would like to change it, specify the path of logfile to
this edit box.
(example) "c:\gdd\errlog.txt"
- Temp Log
gdd stores the temporary logfile of each session in temporary directory.
".\tmp" is selected by default. If you would like to change it,
specify the path of temporary directory to this edit box.
(example) "c:\gdd\tmp"
- Action
gdd can execute specified action if the specified pattern is included in
the session stream. "action" consists of two parts. First one
is the "execution filename" which is executed when the specified
pattern is included. Second one is the "pattern" which is specified
to grep. The format of "action" is as follows.
execution_file:pattern
gdd executes grep to the temporary session file by specified "pattern".
If grep finds the specified pattern, gdd execute specified execution file.
- Show connection status on console
If this check box is checked, the connection status is shown on the console
when the connection is established or closed.
- Help
This document is displayed.
- Update
It connects with the official site of gdd. You can get the newest information
on gdd.
Official web siteFhttp://www.shadowpenguin.org/sc_toolbox/unix/gdd/index.html
- Default
The parameters of gdd are cleared to default setting.
- Save
The setup parameter is written in a setting file.
4. Caution
Currently, this program maybe has some bugs. There is possibility that
the host running gdd can be attacked remotely and locally (especially,
DoS attack). Use of this program constitutes acceptance for use in an AS
IS condition. There are NO warranties with regard to this program. In no
event shall we be liable for any damages whatever arising out of or in
connection with the use or spread of this program. However, we would like
to improve this program, if you find bug of this program, or have any comment
to improve this program, please e-mail to webmaster@shadowpenguin.org.
We recognize that this program can also be used for system cracking purpose.
We hope that this program is not used by crackers or script kiddies.
5. License
This program is free software; you can redistribute it and/or modify it
under the terms of the GNU General Public License as published by the Free
Software Foundation; either version 2 of the License, or (at your option)
any later version. This program is distributed in the hope that it will
be useful, but WITHOUT ANY WARRANTY; without even the implied warranty
of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General
Public License for more details.
Copyright(C)1998-2002 The Shadow Penguin
Security
Wembaster <webmaster@shadowpenguin.org>
http://www.shadowpenguin.org