Hacking networks with Python // Creating malicious packets and breaking TCP/IP rules
HTML-код
- Опубликовано: 3 авг 2024
- Learn the basics of how to use Python and Scapy to create malicious or dodgy packets and send those into networks. Who knows what's going to happen when packets are created like these. Also learn that what they teach you about the TCP/IP model in the CCNA course isn't necessarily true in the real world.
You need to learn to code! Learn Python. Learn Networking. You are going to be very powerful and very scary if you combine knowledge of networking with Python scripting! But, do good.
Learn to code. Learn Linux. Learn Networking.
// Menu //
00:00 - Coming up
00:28 - Introduction
01:00 - How to generate dodgy packets with Scapy
01:14 - TCP/IP model
01:25 - Protocol data units
01:46 - OSI model video
02:12 - Importing Scapy into Python
04:25 - Spoof mac address
06:18 - Sending traffic into the network
08:52 - Sending weird packets
11:43 - "Advanced stuff"
15:11 - In the real world
17:17 - Conclusion
The OSI Model is a lie: • The OSI Model is a lie...
Scapy documentation: scapy.net/
Playlist: davidbombal.wiki/scapy
// SCAPY RESOURCES //
Website: scapy.net/
Documentation: scapy.readthedocs.io/en/latest/
// SCAPY INSTALLATION //
sudo apt update
sudo apt install python3-pip
sudo pip3 install scapy
// SOCIAL //
Discord: / discord
Twitter: / davidbombal
Instagram: / davidbombal
LinkedIn: / davidbombal
Facebook: / davidbombal.co
TikTok: / davidbombal
RUclips: / davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
python
scapy
kali linux
kali
kali linux python
osi model
tcp
tcp ip
tcp/ip
tcp ip model
python scapy
ccna
ccnp
ccie
cisco routers
ccna 200-301
python scripts
linux
kali
kali linux 2022
kali linux 2021
oscp
ceh
security+
pentest+
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#python #hacking #cyber Наука
// Menu //
00:00 - Coming up
00:28 - Introduction
01:00 - How to generate dodgy packets with Scapy
01:14 - TCP/IP model
01:25 - Protocol data units
01:46 - OSI model video
02:12 - Importing Scapy into Python
04:25 - Spoof mac address
06:18 - Sending traffic into the network
08:52 - Sending weird packets
11:43 - "Advanced stuff"
15:11 - In the real world
17:17 - Conclusion
Learn the basics of how to use Python and Scapy to create malicious or dodgy packets and send those into networks. Who knows what's going to happen when packets are created like these. Also learn that what they teach you about the TCP/IP model in the CCNA course isn't necessarily true in the real world.
You need to learn to code! Learn Python. Learn Networking. You are going to be very powerful and very scary if you combine knowledge of networking with Python scripting! But, do good.
Learn to code. Learn Linux. Learn Networking.
The OSI Model is a lie: ruclips.net/video/apr63p7K_3A/видео.html
Scapy documentation: scapy.net/
Playlist: davidbombal.wiki/scapy
// SCAPY RESOURCES //
Website: scapy.net/
Documentation: scapy.readthedocs.io/en/latest/
// SCAPY INSTALLATION //
sudo apt update
sudo apt install python3-pip
sudo pip3 install scapy
// SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
RUclips: ruclips.net/user/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.
Can you make a video on the all the tools in the aricrack-ng suite one video per tool
Hi thanks for the video. Pls do post more stuff using scapy
David, does this mean I can launch a dos on a website with scapy using random source ip in layer 3 and not get blocked?
How to prevent this as a foreign attack?
For example, if someone penetrates your Network.
How can we prevent that form of attack?
gg
Great to see a real-world discussion of how the OSI and TCP models should really be treated. Makes this old CCIE guy happy!
David, I truly appreciate you continuing to drop absolute *bangers* like these, and I've always admired your Python code, it's elegant and easy to understand!!!
Thank you!
Seconded. as someone who is constantly confounded by Python, the few parts I undersand are written by David!
@@LARKXHIN right?! He plays it off like they're just hacked together, and then you open one and it's laid out so nicely, heavily commented, and has a cool banner lol. He obviously puts a lot of time and effort into them, and you just gotta appreciate that!
@@davidbombal also, as I'm watching this my mind is totally blown man. I've been messing around with stuff like this for a *long* time, and I didn't know Scapy gave you this level of access to the construction of packets...I thought you could just only wrap sockets and use the system level socket interface! I'm going to watch all of your previous Scapy videos now, I should've already done so before but I wrongly assumed it was just socket level stuff. This is awesome!!!
@@jpierce2l33t I have a great team :)
Dude! Thank you for this! You have answered so many questions i have asked in the past and never got a straight answer for. Keep it coming sir you are literally a game changer for this student!
Very happy to hear that!
Thank you for this. Scapy tutorials are very hard to come by on the net and I have not been able to find a book on the subject so your tutorials are excellent and exactly what i have been looking for. Many Thanks.
As someone who is learning networking this is very eye opening. Thank you
I love your content David. Always happy to see the notification! Continue the great work.
Thanks! I appreciate that!
Man do I miss these please keep up doing these, there isn't very good tutorials out there for certain topics like this, so this helps soo much.
I love your other content but I feel it's been awhile since i have seen one of these videos from you.
Glad you like the video! Lots more coming 😀
Hello sir love from India, pls do create tutorials on scapy as I really enjoy your tutorials. Great learning
Thanks, just wish that more people see your channel👏🏽👏🏽👏🏽
You and me both!
Unespected and very instructive as usually. Thank you David!
As an ex IP/Routing Software Engineer worked in developing these protocols, I would say this is very well explained.
Sometimes it is easier to think of a layer as a container that contains another container/s as a data and it just works like vehicle to carry the frame/packet to next hop and so fort.
Really excited and always look forward to watch such amazing content!
Thank you!
hey david just took your ccna udemy course. Absolutely loved it and i am learning a lot . looking forward to learn programming language for offensive security . thanks for all your effort . have a good time
Awesome, thank you!
Thank you for your tremendous work and generosity, Mr Bombal.
You're welcome! And thank you.
Nice video David - great example of how packets and protocols are built and how they can be manipulated. Oh nice use of Wireshark!
Thanks Chris!
Thank you so much! When I was learning scapy I looked so hard for good resources. If you make it, it's is granted quality!
Really loved that video!
We want more videos like this.
Thank you for such amazing tutorials.
Great Video David 😊👍 ... Thanks 🙏
Thank you!
You always have a big contribution in my learning phase and i owe you a lot. I'm very grateful to you.
Thank you! And you're welcome!
This is something that I never thought of! Awesome 👍
Awesome video as always... thanks for the quality content!
Thank you! Glad you enjoyed the video!
Thank you david! As Ethicak hacker, i really appreciate your work! This was so helpful to me
I would love to see more scapy videos. This kind of stuff is fascinating to me.
More Scapy-centric videos, please. Also, a Scapy-themed course would be a good addition to your other *excellent* Udemy courses, which, BTW, I highly recommend to anyone interested in networking.
+1
Very interesting. It makes me want to try it on my own. Amazing work! I'm looking forward for more content like this :D
This is super helpful in just understanding WireShark better. I never knew how WireShark stacked the layers.
Very helpful Scapy video for beginners. Keep them coming
Thanks David!
Again the video that gave me a new perspective on what is possible.
I didn't even know that such a crazy tool like scapy exists. I like it! :)
This is funny when someone is 47, like me, and decides to turn his whole life upside down by career change.
From truck driver to IT technician.I have some prior experience as an administrator of a small web server, but it was years ago.And there are so many things to learn!
But I know I can do this, so I try not to waste my time anymore.
Not only your CCNA course helps me to prepare for exam but your videos about motivation are useful to me.
How about new recommendations from your Book Club? :)
Awesome video, I'm studying for my CCNA exam with your Udemy course and I love it! I Love Python too! Thank You!
Hey David excellent stuff. Would surely like to learn more about scapy. Thanks
Awesome video. I didn't know how scapy worked until I watched this. If you have time I would love to see more content about it.
Glad you enjoyed the video! I'll create more content 😀
Hi david first time I heard the word scapy and after watching your video i installed scapy on my laptop and experienced as you did on your video thanq so much keep it up I expect more videos on scapy
Thanks! Please watch my scapy playlist: davidbombal.wiki/scapy
Very well done Mr. Bombal.
David, I get the part where folks don't need to send it all to do malicious packets. The one thing that I took away from getting my CCNA was the mnemonic All People Seem To Need Data Processing, for remembering the 7 layer model. It was just a nice way to remember what I was trying to do and where I was, while looking at packets (Application, Presentation, Session, Transport, Network, Datalink, Physical).
Sir your content was as powerful as you use to create usually. I am currently working as a Network Administrator at an ISO-certified company and have learned so much from you that I can't mention. We would like you to create more videos on scapy and analyze the top layers too.
Thanks in advance
Accept a lot of love from Pakistan
Thank you Muhammad
Congratulations, David. Very great explanations.
Glad you liked the video!
-Great content Professor David Bombal...!!!
-Well, in the video, basically, the professor showed what I learned many years ago when I was still programming micro-devices from my electronic base where I started in the 90's, which is the following: That the OSI or TCP Model doesn't exist, I mean...
-Back in the beginnings of networks, companies created their network hardware and programmed them with protocols that they considered interesting, which basically meant that nothing communicated with anything from other manufacturers.
-And the models and ISOs emerged to make equipment from different manufacturers talk to each other, so the OSI and TCP models are the protocols and ISO models that were adopted together by all companies and this makes them follow the logic of Layers and for here goes why it's how the Firmwares of several vendors were programmed, following them and that's why when everything is working correctly.
-But when working on software like this or like I worked creating hack devices for the military (which is what Hack5 does commercially nowadays), because when programming devices at the machine level the models they can be easily broken or followed as far as we choose.
-For example if programming an Arduino device in C++ things like physical address written in the interface and other things don't exist, you program and configure the NIC which is what the vendors firmware do.
-In Hack is basically what you can do very easily with the NIC being controlled by software like the one in Python that you showed.
-Thanks for the knowledge Professor David...!!!
Great videos in general. Maybe the reason people struggle with scapy is that they dont know how to properly read the documentation of the library.
Or they dont know the solid theory and the fundamentals.
Thanks again for the good content ;)
Really cool - I'll try using Scapy to craft DCHP packets.
Great videos David keep it up🔥🔥🔥
Thanks! Will do!
Omg, absolutely fascinating tutorial! Thank you 🙏
Scapy looks nice for just getting local network info. Do people ever use it for that? Good content as always, yourself and data science make Python interesting again.
I clicked on this on this one for sure, came up in my thread and the thumbnail was more appealing at least to whatever demo I'm in ahaha
ExCellent sir! Thanks for sharing!
Awesome content david sir...clear explanation thanks a lot sir :)
great information like you always provide. thanks. Very very interesting. Yes we want more. I would like to see a video of how to use python code in a windows machine without having to install python or any module on the computer. I tried before but it did not work until i downloaded the python and the module to the computer. thanks again
Thanks alot for your videos, I always learn alot from them
Glad to hear that!
you are the best i've watched so far
You are the best . Really good ideas in this video.
Amazing please do more videos about scapy, thank you
Thx David ,very helpful to understand,👍
David amazing video!!! 👌🏼 Keep doing this!!😉
Great as always
Hope you are doing well David
Very interesting. Great content. Thanks David.
Thank you!
Love the content David!
Outstanding! Please create more videos or a full tutorial Thanks
Hi David, great videos thanks for all you do and the great info! What do you use for your primary Mac?
Excellent video!
I would really like to see more about scapy and sending packages and maybe even for control and surveillance of my network
I'd really love to see some more videos about scappy, I assume based on what I see you can specify the ethernet frame type so technically we could emulate double tagging and stuff like that
Great content! Yes please more scapy:)))))
Thank you!
David I love your videos keep it up
Thank you Nemeab!
Knowledgeable video thanks
Excellent video! Explained effortlessly. I wonder if scapy can be used to create double tagged vlan packets in order to perform vlan hopping? I think you've already spoofed dtp packets to negotiate a trunk to perform the same as above in another video
Awesome video. More scapy please
Thank you soooooooooo much , man I love your channel , thank you so muchhhhh
This was awesome video sir make more videos of python for cyber security i love it
Thanks! Will do!
Thank you, sir
Pls create more of it
Thank you!
Awesome video.
Awesome content
David you are very good teacher!! Thx. Consider creating a hacking challenge website which includes many hacking scenerio examples of networking or more.
Jeez pace yourself man.. week after week ,hit after hit. I'm still watching the the last video. Haha really appreciate the vids man!
Got to keep you busy! 😂
I wish this guy makes an OS course coz then hacking makes more sense
PS : Gold Content
I love your videos
Thank you! I appreciate that :)
Please make more on this topic
Yesss we want more scapyyy
Nice video...
You are the best.
X25 died years ago then IP killed off the osi model you are quite correct. OSI layer and Private dedicated data links became obsolete on IP networks as did the 7 layer osi layer.
Loved it
Thank you.
mind blowing,amazing explanation david
I have a question though, through is through Scapy packet is fully customizable(manipulatable).
If so can I actually send a packet and show my IP(source IP) as something else, even in real world?
I miss those days that I created raw 802.3 packets to write our own interpretation of DEC LAT protocol for DOS and Netware back in the mid 90s.
These days everybody can do that with these tools (very cool btw). But doing it C is a whole different ball game.
socket(AF_INT, SOCK_RAW) stil know the socket binder for it after 28 years 😂
I learned so much from the BSD socket code.
Thanks 😊
VLAN hopping would be a fun one
Here's a start: ruclips.net/video/u5cp_hcwq2c/видео.html
Very nice 🙂
Thank you!
@@davidbombal ❤️
Thanks from India
You're welcome!
Thanks!
Great examples David quick and dirty real-world examples of hacking with Scapy / Python, but if I am interested in starting from a more fundamental stage on Scapy, a more enterprise usage rather than hacking, do you have a recommendation? I will be checking on google for information but I will definitely be interested in your suggestions, I would like to put into practice not just hacking but other enterprise and Data Center functionalities from Python/Scapy, Thank you in advace.
Every computer engineering student should watch your video on OSI being a lie.
I wish the Pythonic way to wrap strings was using the singular quotations rather than double. The shift key changes from keyboard to keyboard and sometimes its very irritating to keep looking down at my keyboard so I use the singular quotation for this reason. Other than that I love the PEP-8 style
thank the great so much
GOOD AS USUAL!
great videooo
Thanks for your content David, what are your thoughts on choosing an actual book over an ebook or vice ver- getting opinions would be good ! - “ just for pure reasons of getting most from the book!
I use both. I prefer reading a physical book, but I prefer O'Reilly for quickly finding information in lots of different books. So, physical for reading, eBooks for finding specific information.
@@davidbombal thank you !
nice I add it to my rootkit😎🎉
Awesome
Be blessed
Thank you!
AMAZING CONTENT!!!! I already bought some of your courses ...how to do to support your channel even more ???
Thank you Alex! I appreciate your support! You can join my RUclips membership if you want to support me.