Description

Most current tools that work at the packet level suffer some deficiencies that will prevent you to correctly map networks, find flaws, test equipments, etc. Learn what those deficiencies are, and how you can overcome them with Scapy (http://www.secdev.org/projects/scapy) to efficiently do network discovery, network stack crash testing, leak findings, Wi-Fi injection, attacks, automating specific tasks, etc. See how to extend Scapy with the obscure protocols you need to test and that have no tools supporting them, all that in a matter of minutes.

Topics

  • Introduction

    • conceptual flaws of other tools

    • Scapy's concepts to avoid those flaws

  • Quick overview

    • packet manipulation

    • sending packets

    • sniffing

    • manipulating packet lists

    • sending and receiving

    • manipulating result lists

    • high level functions

  • Packet creation workshop

    • old school

    • honey, I shrunk the C exploit (by a factor of 100)

  • Fuzzing

    • random everywhere

  • Playing with TTL

    • fun with DNAT

    • sliced network scans

  • Playing with leaks

    • examples of flaws

    • spotting the padding

  • Playing with Wi-Fi

    • sniffing, AP spotting

    • signal strength monitoring

    • frame injection

    • airpwn attack (AP spoofing)

  • Extending Scapy

    • scripting Scapy

    • adding your own protocols

    • building your own tools

Prerequisites

  • good knowledge of TCP/IP protocol suite

  • good python basics (read, understood and practicized http://www.python.org/doc/current/tut/tut.html)

  • some knowledge of Ethernet and 802.11 will help

Prerequisite material

  • computer with Scapy *installed* and *running* and *working*

  • python

  • python-crypto

  • python-gnuplot

  • python-pyx

  • graphviz

  • imagemagick

  • prism2 or 2.5 with recent hostap driver for Wi-Fi injection

Instructor: Philippe Biondi

Philippe Biondi is a research engineer and security expert working at the IT security lab of EADS Corporate Research Center. He is a member of the French Honeynet Project. He was co-author of LIDS. He is the author of Scapy and Shellforge and a lot of other tools. His Scapy tutorial at CanSecWest/core05 was rated one of the best talks of the conference by attendees.

Previous
Previous

Advanced Honeypot Tactics

Next
Next

Wifi (In)Security