RE: Build spoofed IP packets

2005-10-06 Thread Payton, Zack
See scapy.py I've completed windows support at this time and am currently testing it, working out some bugs. If you want a copy just ask. I need some testers. It can do almost any packet transmissions you want. (google it) Z -- http://mail.python.org/mailman/listinfo/python-list

Re: Build spoofed IP packets

2005-10-06 Thread billie
> It's SP2. Microsoft decided allowing raw socket access is a security > threat and disabled it in SP2. Uhm.. I heard about that. Damn it. :-\ -- http://mail.python.org/mailman/listinfo/python-list

Re: Build spoofed IP packets

2005-10-05 Thread Eric Nieuwland
billie wrote: > Traceback (most recent call last): > File "C:\test\client.py", line 156, in ? > send_pkt() > File "C:\test\client.py", line 96, in send_pkt > s.sendto(ip.get_packet(), (dst, 0)) # send packet to server > socket.error: (10004, 'Interrupted system call') > > Note: this onl

Re: Build spoofed IP packets

2005-10-05 Thread billie
> Yes, give us the error. And know that you can't build raw IP packets > unless you're root. > > Sybren Sorry. I forgot to paste the error: Traceback (most recent call last): File "C:\test\client.py", line 156, in ? send_pkt() File "C:\test\client.py", line 96, in send_pkt s.sendto(i

Re: Build spoofed IP packets

2005-10-04 Thread Sybren Stuvel
billie enlightened us with: > For low level packet building I already used Impacket module but if > I specify a spoofed src address during IP packet creation, module > returns an error. Suggestions? Yes, give us the error. And know that you can't build raw IP packets unless you're root. Sybren -