-
-
Save scriptzteam/1ee3f7904503b10f07fa6c02c415339f to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# | |
# This is a small, simple script to test your server's abilities to spoof IPv4 packets or not. | |
# You should use this instead of things like caida project's tool, because they're rumored to | |
# collect data or hand it off to others who harass the server/network owners until they re-configure | |
# their networks and discontinue allowing spoofed packets. | |
# | |
# By default, this script sends spoofed packets to fuzzme.packet.tel - but it can be configured to | |
# send them anywhere. You can download a constantly running pcap by typing: | |
# wget http://fuzzme.packet.tel/fuzzme.packet.tel.last10minutes.pcap | |
# EDIT: packet.tel has been killed off for now, and also I think cock.li (my host) may be in some hot water, | |
# sooooo yeah. No fun utilities like fuzzme for now. | |
# | |
# Thank the White Knights of the Internet for all of this crap. | |
# | |
# Requires scapy and a spoofy box | |
# | |
# Enjoy! | |
# -SCRAMBLR | |
# | |
from scapy.all import * | |
howmany = 30 # Change this if u want | |
destination = "fuzzme.packet.tel" # u can also change this too! | |
message = "yes hello! this is an IPv4 packet header spoofing test from packet.tel's spoofboitest.py test tool!" | |
print("PACKET.TEL LLC - Spoofy Test Tool") | |
print("by SCRAMBLR (https://github.com/scramblr)\r\n\r\n") | |
print("[*] We're gonna be spoofing now!") | |
print("[*] How many packjets r we sending: ") | |
print(howmany) | |
print("[*] Where we sending deez spoofy bois to: ") | |
print(destination) | |
print("[*] Verifying fuzzme.packet.tel still lives on the internet with ICMP ping...") | |
send(IP(dst="fuzzme.packet.tel")/ICMP()) | |
print("[*] Sending some spoofy packjets to da box!") | |
packjet = IP(src=RandIP(),dst=destination)/ICMP()/"SCRAMBLRWUZHERESCRAMBLRWUZHERESCRAMBLRWUZHERESCRAMBLRWUZHERE" | |
send(packjet,count=howmany) | |
print("[*] If you used the default fuzzme.packet.tel destination, you can") | |
print("[*] grab the most recent pcap from the server at:") | |
print("[*] http://fuzzme.packet.tel/fuzzme.packet.tel.last10minutes.pcap") | |
print("[*] If packet.tel is down, setup your own box and point it there instead.") | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment