python
Contents contain hacking techniques, use it properly, do not be evil.
以下内容包含攻击性黑客技术,请妥善使用,勿用于非法用途。
basic-sniffer.py
Use this to capture a TCP packet! A basic tcp sniffer
for sample use.
better_tcp_sniffer.py
This table is construct like the definition size of packet, without extra infomation, a better tcp sniffer
for senior.
┌─────────────────────────────────┬──────────────────────────────────┬──────────┐
│ Destination Mac │ Source Mac │Ether type│
└─────────────────────────────────┴──────────────────────────────────┴──────────┘
┌──────┬──────┬──────────┬─────────────────────┐ ┌────────────────────────┬──────────────────┐
│ Ver │ HL │ TOS │ Total length │ │ Source Port │ Destination Port │
├──────┴──────┴──────────┼──────┬──────────────┤ ├────────────────────────┴──────────────────┤
│ Identification │ Flags│FragmentOffset│ │ Sequence Number │
├─────────────┬──────────┼──────┴──────────────┤ ├───────────────────────────────────────────┤
│ TTL │ Protocol │ Header Checksum │ │ Acknowledgement Number │
├─────────────┴──────────┴─────────────────────┤ ├──────┬────────┬────────┬──────────────────┤
│ Source IP │ │ HL │Reserved│ UAPRSF │ Window Size │
├──────────────────────────────────────────────┤ ├──────┴────────┴────────┼──────────────────┤
│ Destination IP │ │ Checksum │ Urgent Pointer │
├──────────────────────────────────────────────┤ ├────────────────────────┴──────────────────┤
│ Options │ │ Options │
└──────────────────────────────────────────────┘ └───────────────────────────────────────────┘
┌─────────┬───────────────────────────────────────────────────────────────────────────────────┐
│ Data Len│ TCP Data│
└─────────┴───────────────────────────────────────────────────────────────────────────────────┘
pcap_usage.py
Use pcap to send a raw socket packet. It's a very low level usage that only for senior.
You should DROP all RST signal between the connection and handle it yourself.
It's about tcp spoof
.
synflood.py
I cut a part of code to make it out of work, sorry about that.
But you know where to find it :P
Add to your iptables somthing like this
iptables -A INPUT -p tcp -s 192.168.152.134 -j DROP
iptables -A OUTPUT -p tcp -d 192.168.152.134 --tcp-flags RST RST -j DROP
To tell your kenel:
Do not send RST packet to target.134 -- that is what SYN FLOOD
is
Drop every tcp packet from target.134 -- is it evil? YES.
tcpevil.py
Yes it is so evil to inject a tcp packet: here is tcp hijack
.
http_sniffer.py
Here's a good HTTP sniffer
request and response! You got to love it!
my_trace_route.py
Here's a nice and fast trace route
tool! Hope you like it!
Example in image shows a target that 12 TTL away and its results from ICMP/TCP/UDP.
NOTE
SOCK_RAW for MacOS: Check `https://github.com/pynetwork/pypcap` to get the `libpcap`