Create Packets from Scratch with Scapy [Tutorial]

preview_player
Показать описание
How to Create Fake Packets Using a Packet Manipulation Tool

Being able to infiltrate communications between devices is extremely valuable to a hacker. On this episode of Cyber Weapons Lab, we'll show you how to create and manipulate packets with a Python tool called Scapy.

This is just a quick example of how a hacker could use Scapy to craft packets that allow them to stay under the radar even when they're doing things on a network that they're connected to. Because Scapy allows us to build packets from scratch, it means we can get as creative as we want. If we want to kick someone off the network while not being so obvious it was us, we can simply create fake packets that say that the router is the one kicking them off. We can also run a network scan by simply pretending to be the router sending out ARP requests getting everybody to reply and just sitting back and listening for those replies with Wireshark. It's really easy to use Scapy for a variety of different creative things, and the more you learn about TCP/IP, the more useful it will be for your hacking endeavors.

Follow Null Byte on:
Рекомендации по теме
Комментарии
Автор

This was such a great tutorial i can't even describe how good it was 👏

nikolanojic
Автор

More video on scapy please! And congratulations for your videos, well done!

alexxxcanz
Автор

Thank you for the effort you are doing

nizaranyonemos
Автор

Awesome videos. the libraries you are introducing are awesome. Please keep going with them. So, we can use them in an advanced level.

amirmostaghimi
Автор

i love this maybe I go and take a CCNA course

moha_linus
Автор

I'm very much at the beginning of my pen testing career, and your videos have been exactly what I need, concise, informative, interesting :) I also built a Rasp PI pen testing tool off the back of your videos!


Is there a way to send a packet over wifi pretending to be a router when you are not part of that network?


ty :) Keep up the good work

kAht
Автор

I like your videos, short sweet and to the point. Maybe this is overkill but using macchanger and the mac spoofing ability provided in scapy doubles the protection. Keep producing great videos.

incomingairsupport
Автор

my guy is so advanced he finds flooding a router with broken packets is funny

css
Автор

Destination MAC is: b8:a1:75:d5:1e:03 and Source MAC is: 30:52:cb:6b:76:5f, after that the 0x0800 just means the Ethertype is IPv4

George-pvlq
Автор

I don't think people understand just how creative you can get with this. 😈😈

Nice video!
😊👍

mangalisomdingi
Автор

Was just wondering why you didn't use tcpdump instead of wireshark.

hackmasterHQ
Автор

the quality of the voice is impressive

randabdulaziz
Автор

with the SEND command as you show on the wireshark its only the sync, what if we need the same thing but with the full 3 way handshake???

oscarsalgado
Автор

7:42 The way he said "but it's not normal" is really creepy

medjemps
Автор

Thank you guys 4 this amaizing tutirials. Love them and you so much, but I have 2 requests.
1: Please make your font in terminal bigger, cause sometimes I (think, not only I) watch your videos on a smartfone and it's too hard to make out, what's written there.
2:Please make a tutorial, where you describe how to work with a LAN network, where all hosts are isolated from each other. (wifi for example, where nmap can't find any hosts except router). What can we do with it, which attacks we can perform and what info we can gather in such network.
Anyway, thanks a lot. Good luck!

seriousass
Автор

I'll point out that Wire shark does actually show you the device name of the computer you sent the packet with on scapy.

numberiforgot
Автор

Can we use scapy to send wps pin to the router and how

TOn-fxgr
Автор

Are the Steps different if the packet is being sent to a public IP eg WAN address?

jrpasinski
Автор

is there some way to catch the packets that get returned?

megaxenu
Автор

Can i create also a adv_packet for Bluetooth?

kekkettoful