RE: Build spoofed IP packets
See scapy.py I've completed windows support at this time and am currently testing it, working out some bugs. If you want a copy just ask. I need some testers. It can do almost any packet transmissions you want. (google it) Z -- http://mail.python.org/mailman/listinfo/python-list
Re: Build spoofed IP packets
It's SP2. Microsoft decided allowing raw socket access is a security threat and disabled it in SP2. Uhm.. I heard about that. Damn it. :-\ -- http://mail.python.org/mailman/listinfo/python-list
Re: Build spoofed IP packets
billie enlightened us with: For low level packet building I already used Impacket module but if I specify a spoofed src address during IP packet creation, module returns an error. Suggestions? Yes, give us the error. And know that you can't build raw IP packets unless you're root. Sybren -- The problem with the world is stupidity. Not saying there should be a capital punishment for stupidity, but why don't we just take the safety labels off of everything and let the problem solve itself? Frank Zappa -- http://mail.python.org/mailman/listinfo/python-list
Re: Build spoofed IP packets
Yes, give us the error. And know that you can't build raw IP packets unless you're root. Sybren Sorry. I forgot to paste the error: Traceback (most recent call last): File C:\test\client.py, line 156, in ? send_pkt() File C:\test\client.py, line 96, in send_pkt s.sendto(ip.get_packet(), (dst, 0)) # send packet to server socket.error: (10004, 'Interrupted system call') Note: this only happens on Windows XP prof SP2. On Linux I got no problems. I run the program as Administrator. -- http://mail.python.org/mailman/listinfo/python-list
Re: Build spoofed IP packets
billie wrote: Traceback (most recent call last): File C:\test\client.py, line 156, in ? send_pkt() File C:\test\client.py, line 96, in send_pkt s.sendto(ip.get_packet(), (dst, 0)) # send packet to server socket.error: (10004, 'Interrupted system call') Note: this only happens on Windows XP prof SP2. On Linux I got no problems. I run the program as Administrator. It's SP2. Microsoft decided allowing raw socket access is a security threat and disabled it in SP2. --eric -- http://mail.python.org/mailman/listinfo/python-list