python———scapy库(数据包发送)
Scapy的是⼀个强⼤的交互式数据包处理程序(使⽤python编写)。它能够伪造或者解码⼤量的⽹络协议数据包,能够发送、捕捉、匹配
请求和回复包等等。它可以很容易地处理⼀些典型操作,⽐如端⼝扫描,tracerouting,探测,单元测试,攻击或⽹络发现(可替代
hping,NMAP,arpspoof,ARP-SK,arping,tcpdump,tethereal,P0F等)。最重要的他还有很多更优秀的特性——发送⽆效数据
帧、注⼊修改的802.11数据帧、在WEP上解码加密通道(VOIP)、ARP缓存攻击(VLAN)等,这也是其他⼯具⽆法处理完成的。
⼆层发现:
root@kali:~# scapy
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.3.2)
>>> a=ARP()
>>> ="192.168.19.132"
>>> b=sr1(a)
Begin emission:
*Finished to nd 1 packets.
Received 1 packets, got 1 answers, remaining 0 packets
>>> y()
###[ ARP ]###
hwtype= 0x1
ptype= 0x800
hwlen= 6
朋友的作文 plen= 4
op= is-at
hwsrc= 00:0c:29:d5:72:8c
psrc= 192.168.19.132
hwdst= 00:0c:29:40:d7:6d
pdst= 192.168.19.129
###[ Padding ]###
load= 'x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
>>>
⼆层发现⽬标主机存在的标志:得到反映包数据包。
三层发现:
root@kali:~# scapy
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.3.2)
>>> a=IP()
>>> b=ICMP()
>>> c=(a/21英语怎么读 b)
>>> c[IP].dst="192.168.19.132"
>>> d=sr1(c)
Begin emission:
.Finished to nd 1 packets.
*
Received 2 packets, got 1 answers, remaining 0 packets
>>> y()
三层发现⽬标存在的标志是:⽬标成功返回⼀个数据包。
四层发现:
root@kali:~# scapy
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.3.2)
>>> a=IP()
>>> b=TCP()
>>> c=(a/b)
>>> c[IP].dst="从开头的成语 192.168.19.132"
>>> c[IP].dst="192.168.19.132"
>>> c[TCP].flags="A"
>>> y() //发送的包
###[ IP ]###
version= 4
ih总是做梦是什么原因导致的 l= None
tos= 0x0
len= None
id= 1
flags=
frag= 0
ttl= 64
proto= tcp
chksum= None
src= 192.168.19.129
dst= 192班长英语怎么读 .168.19.132
options
###[ TCP ]###
sport= ftp_data
dport= http
q= 0
ack= 0
dataofs= None
rerved= 0
flags= A
window= 8192
chksum= N关于美的句子 one
urgptr= 0
options= {}
>>> e=sr1(c)
Begin emission:
.Finished to nd 1 packets.
*
Received 2 packets, got 1 answers, remaining 0 packets
>>> y() //返回的包
###[ IP ]###
version= 4L
ihl= 5L
tos= 0x0
len= 40
id= 0
flags= DF
frag= 0L
ttl= 64
proto= tcp
chksum= 0x927a
src= 192.168.19.132
dst= 192.168.19.129
options
###[ TCP ]###
sport= http
dport= ftp_data
q= 0
ack= 0
dataofs= 5L
rerved= 0L
flags= R
window= 0
chksum= 0x727
urgptr= 0
options= {}
#棒棒糖英语怎么说 ##[ Padding ]###
load= 'x00x00x00x00x00x00'
>>>
root@kali:~# scapy
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.3.2)
>>> a=IP()
>>> b=TCP()
>>> c=(a/b)
>>> c[IP].dst="192.168.19.132"
>>> c[TCP].flags="A"
>>> e=sr1(c)
四层发现⽬标存在的标志是:返回包中flags为R
本文发布于:2023-04-28 11:34:13,感谢您对本站的认可!
本文链接:https://www.wtabcd.cn/fanwen/fan/82/519335.html
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。
留言与评论(共有 0 条评论) |