mirror of
https://github.com/20kaushik02/CSE545_SS_Work.git
synced 2025-12-06 06:34:06 +00:00
some project 3
This commit is contained in:
parent
ca6eb8a05a
commit
0566deef79
19
3.06/scapy_reader.py
Normal file
19
3.06/scapy_reader.py
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
#!/opt/pwn.college/python
|
||||||
|
|
||||||
|
from scapy.utils import rdpcap
|
||||||
|
from scapy.packet import Raw
|
||||||
|
|
||||||
|
pcap_path = "/home/hacker/my_pcaps/3.06.pcap"
|
||||||
|
pcap_file = rdpcap(pcap_path)
|
||||||
|
|
||||||
|
result = ""
|
||||||
|
alternate=True
|
||||||
|
for pkt in pcap_file:
|
||||||
|
try:
|
||||||
|
if alternate:
|
||||||
|
result += pkt[Raw].load.decode()
|
||||||
|
alternate = not alternate
|
||||||
|
except:
|
||||||
|
pass
|
||||||
|
|
||||||
|
print(result)
|
||||||
6
3.08/scapy_ether.py
Normal file
6
3.08/scapy_ether.py
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
from scapy.all import *
|
||||||
|
|
||||||
|
l2=Ether(src='a6:cb:ec:88:05:5e', dst='cc:cc:cc:cc:cc:cc', type=0xFFFF)
|
||||||
|
pkt=l2
|
||||||
|
|
||||||
|
ans, unans=srp(pkt, iface='eth0')
|
||||||
7
3.09/scapy_ip.py
Normal file
7
3.09/scapy_ip.py
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
from scapy.all import *
|
||||||
|
|
||||||
|
l2=Ether(src='86:22:3f:d1:20:b5', dst='cc:cc:cc:cc:cc:cc')
|
||||||
|
l3=IP(src='10.0.0.2', dst='10.0.0.3', proto=0xFF)
|
||||||
|
pkt=l2/l3
|
||||||
|
|
||||||
|
ans, unans=srp(pkt, iface='eth0')
|
||||||
15
3.11/scapy_tcp_handshake.py
Normal file
15
3.11/scapy_tcp_handshake.py
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
from scapy.all import *
|
||||||
|
|
||||||
|
l2=Ether(src='96:e4:fb:1b:7b:fd', dst='cc:cc:cc:cc:cc:cc')
|
||||||
|
l3=IP(src='10.0.0.2', dst='10.0.0.3')
|
||||||
|
|
||||||
|
syn_l4=TCP(sport=31337, dport=31337, seq=31337, ack=31337, flags=0x02)
|
||||||
|
syn_pkt=l2/l3/syn_l4
|
||||||
|
|
||||||
|
ans,unans=srp(syn_pkt, iface='eth0')
|
||||||
|
print(ans[0].answer[TCP])
|
||||||
|
|
||||||
|
ack_l4=TCP(sport=31337, dport=31337, seq=31338, ack=ans[0].answer[TCP].seq + 1, flags=0x10)
|
||||||
|
ack_pkt=l2/l3/ack_l4
|
||||||
|
|
||||||
|
ans,unans=srp(ack_pkt, iface='eth0')
|
||||||
@ -140,3 +140,89 @@ int M[12][12]={
|
|||||||
- goal is row 2, column 12 (x=0xb, y=1)
|
- goal is row 2, column 12 (x=0xb, y=1)
|
||||||
- ssssdsssddsssdddwwwddwwwwdwwd
|
- ssssdsssddsssdddwwwddwwwwdwwd
|
||||||
- lol
|
- lol
|
||||||
|
|
||||||
|
## Project 03 Hacking Network Highways
|
||||||
|
|
||||||
|
### .01 - netcat
|
||||||
|
|
||||||
|
```bash
|
||||||
|
nc 10.0.0.3 31337
|
||||||
|
```
|
||||||
|
|
||||||
|
### .02 - netcat listener
|
||||||
|
|
||||||
|
```bash
|
||||||
|
nc -l 31337
|
||||||
|
```
|
||||||
|
|
||||||
|
### .03 - nmap and netcat
|
||||||
|
|
||||||
|
```bash
|
||||||
|
nmap 10.0.0.0-255 # found in .142
|
||||||
|
nc 10.0.0.142 31337
|
||||||
|
```
|
||||||
|
|
||||||
|
### .04 - nmap in parallel and netcat
|
||||||
|
|
||||||
|
- `-sn` for ARP ping scan - no ports just discover host
|
||||||
|
- `--min-parallelism 10` for at least 10 probes at a time
|
||||||
|
- consider using `-T4` or `-T5` timing templates
|
||||||
|
- checked
|
||||||
|
- `10.0.0.0/19` - only us at .2
|
||||||
|
- `10.0.32.0/19` - nothing
|
||||||
|
- `10.0.64.0/19` - 10.0.90.244 and port is 31337 as expected. stopped here
|
||||||
|
|
||||||
|
### .05 - tcpdump
|
||||||
|
|
||||||
|
- `tcpdump -A 'tcp port 31337'`
|
||||||
|
- `-A` to print content as ASCII
|
||||||
|
|
||||||
|
### .06 - tcpdump and flow
|
||||||
|
|
||||||
|
- inspecting the /challenge/run python script, we see that it's sending one character at a time, after encoding them
|
||||||
|
- `tcpdump -s 65535 -nntA 'tcp port 31337' -w /home/hacker/my_pcaps/3.06.pcap`
|
||||||
|
- `-s` to grab full packet (?)
|
||||||
|
- `-nn` to avoid resolution of hostnames or port numbers
|
||||||
|
- `-t` to exclude timestamp
|
||||||
|
- `-A` to print content as parsable ASCII. important!!!
|
||||||
|
- then we use scapy to read the packets, skip alternating duplicates, decode, and form a single string
|
||||||
|
- ehh i messed up something but whatever
|
||||||
|
|
||||||
|
### .07 - mimic and listen
|
||||||
|
|
||||||
|
- `ip addr add 10.0.0.2 dev eth0` assign the address to us, fake
|
||||||
|
- `nc -l 10.0.0.2 31337`
|
||||||
|
|
||||||
|
### .08 - ether scapy
|
||||||
|
|
||||||
|
- jfc
|
||||||
|
- ALWAYS be explicit and define the src addresses
|
||||||
|
- didn't define the src MAC addr, so packets kept going thru `lo` instead of `eth0`
|
||||||
|
- too stupid to realize it in time too
|
||||||
|
- anyway, get current MAC addr of `eth0`
|
||||||
|
- craft Ether packet to given dest addr with type `0xFFFF`
|
||||||
|
- `srp(pkt, iface='eth0')`
|
||||||
|
|
||||||
|
### .09 - IP scapy
|
||||||
|
|
||||||
|
- similar
|
||||||
|
- set IP addr with `ifconfig eth0 10.0.0.2`
|
||||||
|
- add l3 with src and dest IP addr, `proto=0xFF`
|
||||||
|
- since we need MAC as well, use `srp`, not `sr`
|
||||||
|
|
||||||
|
### .10 - TCP scapy
|
||||||
|
|
||||||
|
- similar
|
||||||
|
- again, set IP addr
|
||||||
|
- add l4 with src and dest TCP port, `flags=0x1F` to set ACK (0x10), PSH (0x08), RST (0x04), SYN (0x02), FIN (0x01) flags
|
||||||
|
- `srp` again
|
||||||
|
|
||||||
|
### .11 - TCP handshake
|
||||||
|
|
||||||
|
- send SYN with specified seq and ack numbers - 31337 both
|
||||||
|
- get SYNACK
|
||||||
|
- has ack of 31338, which will be our next syn
|
||||||
|
- has random syn, add 1 to get next ack
|
||||||
|
- send ACK with next syn and ack numbers
|
||||||
|
|
||||||
|
### .12 - ARP scapy
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user