10.08.2015 Views

Packet generation and network based attacks with Scapy - SecDev.org

Packet generation and network based attacks with Scapy - SecDev.org

Packet generation and network based attacks with Scapy - SecDev.org

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Introduction<strong>Scapy</strong>Network discovery <strong>and</strong> <strong>attacks</strong><strong>Packet</strong> ManipulationImplicit <strong>Packet</strong>sGenesisConceptsQuick overview>>> b.ttl=(10,14)>>> b.payload.dport=[80,443]>>> [k for k in b][< IP ttl=10 proto=TCP dst=192.168.1.1 |< TCP dport=80 flags=FS |>>,< IP ttl=10 proto=TCP dst=192.168.1.1 |< TCP dport=443 flags=FS |>>,< IP ttl=11 proto=TCP dst=192.168.1.1 |< TCP dport=80 flags=FS |>>,< IP ttl=11 proto=TCP dst=192.168.1.1 |< TCP dport=443 flags=FS |>>,< IP ttl=12 proto=TCP dst=192.168.1.1 |< TCP dport=80 flags=FS |>>,< IP ttl=12 proto=TCP dst=192.168.1.1 |< TCP dport=443 flags=FS |>>,< IP ttl=13 proto=TCP dst=192.168.1.1 |< TCP dport=80 flags=FS |>>,< IP ttl=13 proto=TCP dst=192.168.1.1 |< TCP dport=443 flags=FS |>>,< IP ttl=14 proto=TCP dst=192.168.1.1 |< TCP dport=80 flags=FS |>>,< IP ttl=14 proto=TCP dst=192.168.1.1 |< TCP dport=443 flags=FS |>>]Philippe BIONDI<strong>Packet</strong> <strong>generation</strong> <strong>and</strong> <strong>network</strong> <strong>based</strong> <strong>attacks</strong> <strong>with</strong> <strong>Scapy</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!