Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Main Page/Featured Article"

From NetSec
Jump to: navigation, search
 
(11 intermediate revisions by 4 users not shown)
Line 1: Line 1:
<center><big>'''Arp poisoning with scapy'''</big></center>
+
<center><big>'''[[Shellcode/Appendix|Shellcode Appendix]]'''</big></center>
  
Scapy is a [[Python]] ibrary found in most distribution's repositories under scapy or python-scapy and it must be ran as root for most (if not all) operations. Sniffing in scapy is fairly straight forward using the sniff() function. Packet crafting can be done by creating each header, ethernet headers (include source and destination MAC addresses) using Ether(), IP headers (which include information such as source and destination IP addresses) via the IP() function. If it is a TCP packet, the TCP() function is used, and if it is UDP, the UDP() function.
+
'''The Shellcode Appendix''' is a collection of shellcodes and documentation developed by our staff. The included shellcode is flexible, can bypass firewalls, automated detection, and demonstrate advanced shellcoding techniques.
  
<center>'''''[[Arp poisoning with scapy|Learn more - Arp poisoning with scapy]]'''''</center>
+
<center>'''''[[Shellcode/Appendix|Learn more - Shellcode Appendix]]'''''</center>

Latest revision as of 22:38, 22 April 2013

Shellcode Appendix

The Shellcode Appendix is a collection of shellcodes and documentation developed by our staff. The included shellcode is flexible, can bypass firewalls, automated detection, and demonstrate advanced shellcoding techniques.

Learn more - Shellcode Appendix