Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
BSides London - Scapy Workshop
Download to read offline and view in fullscreen.


Scapy talk

Download to read offline

Scapy Primer Session at Bangalore Local Security Meetup.

Null , SecurityXploded, Garage4hackers , OWASP

Related Books

Free with a 30 day trial from Scribd

See all

Scapy talk

  1. 1. NullSecurityXploded Ashwin PatilGarage4hackers GCIH, RHCE,CCNA Information Security EnginnerOWASP
  2. 2. Agenda Introduction Why Scapy ? Basic Commands Building your first packet Assembling full packet Write your own Port scanner Demo: SYN Scan and IP Spoofing Built-in Sniffer Functionality Scapy Strengths References
  3. 3. Introduction Powerful interactive packet manipulation program Enable to send, sniff, dissect and forge network packets Can manipulate and process packets at every layer of TCP/IP Supports wide range of Protocols and adding your own. Interactive shell OR Python module Today : Interactive shell and TCP/IP
  4. 4. Why Scapy ? Flexible unlike other packet crafting tools with limited functionalities. Little knowledge required to build your own tools Single Replacement for Multiple tools such as wireshark, nmap, hping etc. Build your own tools with Combined Techniquese.g. VLAN hopping + ARP Cache poisoning Any field in every TCP/ IP layer can be altered Decode packets ( Received a TCP Reset on port 80),and not Interprets ( Port 80 is Closed)
  5. 5. Basic Commands Scapy Start List of Supported Protocols Available Commands in Scapy
  6. 6. IP HeaderIP Fields in Scapy
  7. 7. TCP HeaderTCP Fields in Scapy
  8. 8. Building your first packetBuilding packet at IP layerBuilding packet at TCP layer
  9. 9. Assembling full packetAssembling full packet at TCP/IP Packet ready to send with Calculated values
  10. 10. Write your own port scannerPort Scanning :“An attack that sends client requests to a range of server port addresses on a host, with the goal of finding an active port”Result Status :Open : The host sent a reply indicating that a service is listening on the port.Closed : The host sent a reply indicating that connections will be denied to the port.Filtered: There was no reply fromthe host.
  11. 11. Demo Time DEMO
  12. 12. Demo : SYN ScanSYN Scan: a.k.a. Half Open scanningSends : SYN PacketResponse:SYN, ACK- Open,RST, ACK – Closed,No response - Filteredand if Port is open then doesnt send ACK to complete 3way handshake.
  13. 13. Built-in Sniffing FunctionalitySniffing:”Captures traffic on all or just parts of the network from single machine within the network”
  14. 14. Scapy Strengths Rogue Router Advertisements with Scapy Malicious Content Harvesting with Python, WebKit, and Scapy DEEPSEC: Extending Scapy by a GSM Air Interface Use Scapy to test snort rulesAnd many more …..
  15. 15. References Scapy Nmap port scanning techniques
  16. 16. Thank You !!!Comments ,Feedbacks, SuggestionsTwitter : @ashwinpatilLinkedIn : : ashwin_patil Image Credit:
  • FernandoMelo79

    Jun. 27, 2016
  • AndyDavies

    Mar. 11, 2015

Scapy Primer Session at Bangalore Local Security Meetup. Null , SecurityXploded, Garage4hackers , OWASP


Total views


On Slideshare


From embeds


Number of embeds