mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-03 15:24:59 -04:00
fix some readmes, added some inits, partially done writing the scapy scripts
This commit is contained in:
parent
ffb92e0614
commit
d29d4e115d
21 changed files with 107 additions and 39 deletions
|
@ -2,3 +2,29 @@
|
|||
|
||||
__author__ = "bt3"
|
||||
|
||||
''' A simple sniffer to capture SMTP, POP3, IMAP credentials'''
|
||||
|
||||
|
||||
''''
|
||||
DOCUMENTATION:
|
||||
# sniffer that dissects and dumps the packets out
|
||||
# filter allows to specify a BPF, wireshark style to packets,
|
||||
# for example, to sniff all HTTP packets you use a BPF filter of tcp
|
||||
# and port 80
|
||||
# iface parameter tells the sniffer which network interface to sniff on
|
||||
# prn parameter specifies a callback function to every packet that matches the filter
|
||||
# and it will receive packet as its single parameter
|
||||
# count specifies how many packets you want to sniff (blank: infinite)
|
||||
sniff(filter'', iface='any', prn=function, count=N)
|
||||
'''
|
||||
|
||||
|
||||
from scapy.all import *
|
||||
|
||||
# our packet callback
|
||||
def packet_callback(packet):
|
||||
print packet.show()
|
||||
|
||||
# fire up the sniffer
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue