Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.


Scapy talk Slide 1 Scapy talk Slide 2 Scapy talk Slide 3 Scapy talk Slide 4 Scapy talk Slide 5 Scapy talk Slide 6 Scapy talk Slide 7 Scapy talk Slide 8 Scapy talk Slide 9 Scapy talk Slide 10 Scapy talk Slide 11 Scapy talk Slide 12 Scapy talk Slide 13 Scapy talk Slide 14 Scapy talk Slide 15 Scapy talk Slide 16
Upcoming SlideShare
BSides London - Scapy Workshop
Download to read offline and view in fullscreen.



Download to read offline

Scapy talk

Download to read offline

Scapy Primer Session at Bangalore Local Security Meetup.

Null , SecurityXploded, Garage4hackers , OWASP

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Scapy talk

  1. 1. Null SecurityXploded Ashwin Patil Garage4hackers GCIH, RHCE,CCNA Information Security Enginner OWASP
  2. 2. Agenda  Introduction  Why Scapy ?  Basic Commands  Building your first packet  Assembling full packet  Write your own Port scanner  Demo: SYN Scan and IP Spoofing  Built-in Sniffer Functionality  Scapy Strengths  References
  3. 3. Introduction  Powerful interactive packet manipulation program  Enable to send, sniff, dissect and forge network packets  Can manipulate and process packets at every layer of TCP/IP  Supports wide range of Protocols and adding your own.  Interactive shell OR Python module  Today : Interactive shell and TCP/IP
  4. 4. Why Scapy ?  Flexible unlike other packet crafting tools with limited functionalities.  Little knowledge required to build your own tools  Single Replacement for Multiple tools such as wireshark, nmap, hping etc.  Build your own tools with Combined Techniques e.g. VLAN hopping + ARP Cache poisoning  Any field in every TCP/ IP layer can be altered  Decode packets ( Received a TCP Reset on port 80), and not Interprets ( Port 80 is Closed)
  5. 5. Basic Commands  Scapy Start  List of Supported Protocols  Available Commands in Scapy
  6. 6. IP Header IP Fields in Scapy
  7. 7. TCP Header TCP Fields in Scapy
  8. 8. Building your first packet Building packet at IP layer Building packet at TCP layer
  9. 9. Assembling full packet Assembling full packet at TCP/IP Packet ready to send with Calculated values
  10. 10. Write your own port scanner Port Scanning : “An attack that sends client requests to a range of server port addresses on a host, with the goal of finding an active port” Result Status : Open : The host sent a reply indicating that a service is listening on the port. Closed : The host sent a reply indicating that connections will be denied to the port. Filtered: There was no reply from the host.
  11. 11. Demo Time DEMO
  12. 12. Demo : SYN Scan SYN Scan: a.k.a. Half Open scanning Sends : SYN Packet Response: SYN, ACK- Open, RST, ACK – Closed, No response - Filtered and if Port is open then doesnt send ACK to complete 3way handshake.
  13. 13. Built-in Sniffing Functionality Sniffing: ”Captures traffic on all or just parts of the network from single machine within the network”
  14. 14. Scapy Strengths  Rogue Router Advertisements with Scapy  Malicious Content Harvesting with Python, WebKit, and Scapy  DEEPSEC: Extending Scapy by a GSM Air Interface  Use Scapy to test snort rules And many more …..
  15. 15. References  Scapy Documentation  Nmap port scanning techniques   Images:  
  16. 16. Thank You !!! Comments ,Feedbacks, Suggestions Twitter : @ashwinpatil LinkedIn : Slideshare : ashwin_patil Image Credit:
  • FernandoMelo79

    Jun. 27, 2016
  • AndyDavies

    Mar. 11, 2015

Scapy Primer Session at Bangalore Local Security Meetup. Null , SecurityXploded, Garage4hackers , OWASP


Total views


On Slideshare


From embeds


Number of embeds