Giter Site home page Giter Site logo

0xbharath / art-of-packet-crafting-with-scapy Goto Github PK

View Code? Open in Web Editor NEW
146.0 9.0 38.0 3.52 MB

A workshop on Packet Crafting using Scapy.

Home Page: https://scapy.disruptivelabs.in/

License: Apache License 2.0

Python 100.00%
python packets scapy netsec networking learn-python

art-of-packet-crafting-with-scapy's Introduction

The Art of Packet Crafting with Scapy

Online notes for this workshop is available at - https://scapy.disruptivelabs.in/

Virtual machine for the workshop is available at - https://archive.org/details/pysos_class3_labs_32bit.7z

Documentation is being tracked as part of documentation branch. If you want to contribute to the documentation then make changes to documentation branch and raise a PR.

Prerequisites

  • Little bit of programming experience in some language, not necessarily Python is preferable. (enough to know what's a "variable" or "if statement" etc)
  • Knowledge of Linux command-line skills is necessary but we'll pick it up in the workshop. (Usage of commands like cd, ls, grep, less...)
  • Must have knowledge of basic networking concepts(enough to know what's an IP address, port number, OSI Model etc).

Overview

  • This is an intense workshop on crafting packets using Python and Scapy.
  • We'll explore Scapy and craft packets using the framework.
  • We'll leverage Scapy as a framework to build custom network tools/utilities.

Objective

  • The objective is to understand network programming abstractions, use raw sockets & Scapy to craft packets, improvise in network reconnaissance phase.
  • We will work on practical network reconnaissance techniques like host discovery, service discovery, Remote OS finger printing, promiscuous node detection.
  • We'll learn how to launch Layer 2 attacks and detection techniques for these attacks.
  • We'll leverage Scapy to build custom tools/utilities such as sniffers, pcap analyser, Wi-Fi scanners and simple honeypots.

Environment & Labs

Mysterious boxes

A network with bunch of machines is provided where audience task is to find out as much as they can about the network, machines and security policies using Scapy. One of the machines on this network is a pre-packaged VM with all the necessary packages for attacking installed that we'll use as an attacker box and the other machines act as victims.

Network Hunting - CTF

A mini-CTF on a Software Defined Network. The audience task is to crack a set of challenges, circumvent security measures, subvert systems, perform network attacks to find and obtain the flag.

art-of-packet-crafting-with-scapy's People

Contributors

0xbharath avatar bharath-appsecco avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

art-of-packet-crafting-with-scapy's Issues

Fin scan on closed port and open port

according to my test
the statement is like this:
fin_packet = IP(dst='www.baidu.com')/TCP(dport=80,flags="F") resp = sr1(fin_packet)
no matter 80 is open or closed ,the resp is RA

Question

We are trying to develop a replay attack using Scapy, we are able to update the timestamp of each packet so that they are sent in the order and delay interval they were captured in. However we are unsure if the sendp() function will read data from a pcap file and send it at the right time or just at the fastest it can.

Here is the code we are using for the replay attack:
for pkt, metadata in RawPcapReader('replay_attack_data_file_name.pcap'):
sendp(pkt)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.