Presenting P@cketR@quet: An Auditory IDS/Network Auralizer

Presented at CarolinaCon 14 (2018), April 13, 2018, 7 p.m. (30 minutes).

TLDR; Nifty Python tool to play music corresponding to network traffic that contains the potential for an accessibility function for the visually-impaired. Originally conceived of as a cool idea to examine network traffic generated by penetration testing in lieu of reviewing tcpdump or Wireshark output, p@quetr@quet turned into a valid means of creating music from network traffic patterns. Also, by creating a sound-based representation of network traffic, the utility provides insight into normal traffic patterns as opposed to oddities such as ICMP ping or UDP/TCP port scans. Anyone, whether an analyst or tester, interested in keeping track of the network can listen to the sounds of the packets instead of scrolling through Wireshark or tcpdump packets. As an example, if a port scan was observed by the monitoring interface, those packets would correspond to different sounds, thereby yielding an aural experience matching that traffic pattern. Visually-impaired individuals could be trained as to the notes and corresponding packets and be empowered to conduct hitherto inaccessible network analysis. The project consists of a Python script to demonstrate both live traffic examples and previously recorded packet captures.


Presenters:

  • Killian Ditch
    Killian has been involved in the tech industry for about 10 years, and while dabbling in security throughout, he ventured into the realm of offensive techniques about halfway through. He works as a penetration tester for Coalfire, a company based in Denver, CO, where he attempts to relate the technical aspects presented by vulnerabilities in networks, applications, and people to actionable business risks that companies can address.

Links:

Similar Presentations: