Automated Protocol Analysis

wireshark

[I)ruid] from BreakingPoint Labs has been doing quite a bit of protocol reverse engineering as part of his work. He put together a post covering some of the tools that have been useful for this task. Text-based protocols have a lot of human readable characters that can help you identify fields. Binary protocols don’t have this luxury though. He recommends the Protocol Informatics Project for tackling these situations. It applies bioinformatics algorithms to network traffic. You give it a packet dump of the protocol and it compares them to find similarities the same way genetic sequences are compared. It can be confused by protocols that waste a lot of space, but it’s still a very clever approach to reversing.

[photo: slashcrisis]

4 thoughts on “Automated Protocol Analysis

  1. JIC someone is reversing a binary network proto and comes across this and runs into multiple problems with the ppc .so included, here is the fix, as of today:
    1.) backup or toss the align.so file in the PI subfolder
    2.) aptitude install python-pyrex python-numeric python-pydot
    3.) If on linux, edit the make file and change the -J argument to xargs to -I
    4.) pyrexc align.pyx (this will create align.c)
    5.) make (this will create the .so)
    6.) ./main.py

Leave a Reply to GertCancel reply

Please be kind and respectful to help make the comments section excellent. (Comment Policy)

This site uses Akismet to reduce spam. Learn how your comment data is processed.