2012/09/16
github home | http://github.com/mcarpenter/ipforge |
---|---|
repository URLs |
https://github.com/mcarpenter/ipforge.git git://github.com/mcarpenter/ipforge.git |
If you don't have python's scapy
module in your toolbox then you should really add it. The API makes me
wince slightly (two-letter method names, postfixed by integers (sr1
,
sr2
)) but it provides some really powerful functionality over all
layers of the network stack.
Sometimes I need to poke at the network with forged packets. I (finally)
wrote ipforge.py
to help me do that. telnet(1)
works fine in the majority
of cases for simple TCP connection testing... but otherwise it doesn't:
If you need to do more advanced packet forgery then of course scapy can
help you do that too. Meanwhile you can hit ipforge
from a shell script
to do the simple stuff:
#!/bin/bash while true ; do ipforge.py -f S -p tcp 192.168.1.66 192.168.1.51:666 sleep 1 done
Or from native python:
#!/usr/bin/python from ipforge import ipforge from time import sleep while True: ipforge(src='192.168.1.66', dst='192.168.1.51', dport=666, flags='S') sleep(1)