mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-02 06:46:07 -04:00
fix some readmes, added some inits, partially done writing the scapy scripts
This commit is contained in:
parent
ffb92e0614
commit
d29d4e115d
21 changed files with 107 additions and 39 deletions
0
Network_and_802.11/scapy/__init__.py
Normal file
0
Network_and_802.11/scapy/__init__.py
Normal file
7
Network_and_802.11/scapy/fuzzer.py
Normal file
7
Network_and_802.11/scapy/fuzzer.py
Normal file
|
@ -0,0 +1,7 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
|
||||
from scapy.all import *
|
||||
|
||||
send(IP(dst='192.168.1.114')/UDP()/fuzz(DNS()), inter=1,loop=1)
|
19
Network_and_802.11/scapy/sniff_simple.py
Normal file
19
Network_and_802.11/scapy/sniff_simple.py
Normal file
|
@ -0,0 +1,19 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
|
||||
from scapy.all import *
|
||||
|
||||
def save():
|
||||
a = sniff(filter='icmp', iface='wlp1s0', timeout=10, count=3, prn=lambda x:x.summary())
|
||||
wrpcap('packets.pcap', a)
|
||||
|
||||
def open():
|
||||
p = rdpcap('packets.pcap', p)
|
||||
p.show()
|
||||
|
||||
def scan():
|
||||
res, unans = sr( IP(dst='192.168.1.114')/TCP(flags='S', dport=(1, 1024)))
|
||||
print res.summary()
|
||||
|
||||
scan()
|
|
@ -2,3 +2,29 @@
|
|||
|
||||
__author__ = "bt3"
|
||||
|
||||
''' A simple sniffer to capture SMTP, POP3, IMAP credentials'''
|
||||
|
||||
|
||||
''''
|
||||
DOCUMENTATION:
|
||||
# sniffer that dissects and dumps the packets out
|
||||
# filter allows to specify a BPF, wireshark style to packets,
|
||||
# for example, to sniff all HTTP packets you use a BPF filter of tcp
|
||||
# and port 80
|
||||
# iface parameter tells the sniffer which network interface to sniff on
|
||||
# prn parameter specifies a callback function to every packet that matches the filter
|
||||
# and it will receive packet as its single parameter
|
||||
# count specifies how many packets you want to sniff (blank: infinite)
|
||||
sniff(filter'', iface='any', prn=function, count=N)
|
||||
'''
|
||||
|
||||
|
||||
from scapy.all import *
|
||||
|
||||
# our packet callback
|
||||
def packet_callback(packet):
|
||||
print packet.show()
|
||||
|
||||
# fire up the sniffer
|
||||
|
||||
|
||||
|
|
29
Network_and_802.11/scapy/tcp_handshake.py
Normal file
29
Network_and_802.11/scapy/tcp_handshake.py
Normal file
|
@ -0,0 +1,29 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
|
||||
from scapy.all import *
|
||||
|
||||
# Set port & MAC address
|
||||
FAKE_IP = "10.0.4.4" # Use something that nobody else is going to have
|
||||
MAC_ADDR = "60:67:20:eb:7b:bc" # My actual MAC address
|
||||
|
||||
# Broadcast our fake IP address
|
||||
srp(Ether(dst="ff:ff:ff:ff:ff:ff")/ARP(psrc=FAKE_IP, hwsrc=MAC_ADDR))
|
||||
|
||||
source_port += 1
|
||||
ip_header = IP(dst=dest, src=FAKE_IP) # Set the source port to
|
||||
ans = sr1(ip_header / TCP(dport=80, sport=source_port, flags="S", seq=random.randint(0, 1000))) # SYN
|
||||
# ans is the SYN-ACK
|
||||
reply = ip_header / TCP(dport=80, sport=source_port, seq=ans.ack, ack = ans.seq + 1, flags="A") # ACK
|
||||
send(reply) # Send ACK
|
||||
pkt = ip_header / TCP(dport=80, sport=source_port, seq=reply.seq, flags="AP") / "GET / HTTP/1.1\r\n\r\n" # Send our real packet
|
||||
send(pkt)
|
||||
|
||||
|
||||
ip = IP(src='192.168.1.114', dst='192.168.1.25')
|
||||
SYN = TCP(sport=1024, dport=80, flags='S', seq=12345)
|
||||
packet = ip/SYN
|
||||
|
||||
SYNACK = sr1(packet)
|
||||
ack = SYNACK.seq + 1
|
19
Network_and_802.11/scapy/tools.py
Normal file
19
Network_and_802.11/scapy/tools.py
Normal file
|
@ -0,0 +1,19 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
|
||||
from scapy.all import *
|
||||
|
||||
HOST ='www.google.com'
|
||||
|
||||
def tr():
|
||||
print traceroute(HOST)
|
||||
|
||||
def pi():
|
||||
print arping('192.168.1.114')
|
||||
|
||||
#pi()
|
||||
|
||||
#tr()
|
||||
|
||||
print sniff(iface="wlp1s0",prn=lambda x:x.sprintf("{Dot11Beacon:%Dot11.addr3%\t%Dot11Beacon.info%\t%PrismHeader.channel%\tDot11Beacon.cap%}"))
|
|
@ -1,31 +0,0 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
|
||||
from scapy.all import *
|
||||
|
||||
HOST = "google.com"
|
||||
|
||||
def traceroute():
|
||||
for i in range(1, 28):
|
||||
|
||||
pkt = IP(dst=HOST, ttl=i) / UDP(dport=33434)
|
||||
# Send the packet and get a reply
|
||||
reply = sr1(pkt, verbose=0)
|
||||
|
||||
if reply is None:
|
||||
# No reply =(
|
||||
break
|
||||
|
||||
elif reply.type == 3:
|
||||
# We've reached our destination
|
||||
print "Done!", reply.src
|
||||
break
|
||||
|
||||
else:
|
||||
# We're in the middle somewhere
|
||||
print "%d hops away: " % i , reply.src
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
traceroute()
|
Loading…
Add table
Add a link
Reference in a new issue