This shows you the differences between two versions of the page.
Next revision | Previous revision Last revision Both sides next revision | ||
scapy-usage-examples [2012/08/03 14:19] 94.245.224.234 created |
scapy-usage-examples [2012/08/03 15:33] 94.245.224.234 [examples] |
||
---|---|---|---|
Line 50: | Line 50: | ||
- | [[http://www.packetstan.com/2011/03/extracting-ap-names-from-packet.html|PACKETSTAN: Extracting AP names from Packet Captures ]] | + | * [[http://www.packetstan.com/2011/03/extracting-ap-names-from-packet.html|PACKETSTAN: Extracting AP names from Packet Captures ]] |
- | ping all online IPs; with timeout | + | works great, extracts MAC addresses and ESSIDs found in a pcap file. |
+ | |||
+ | downloaded this script by Tim Medin; run it like this: | ||
+ | |||
+ | <code>./APNameFromPcap.py -f [a .pcap file] | sort -u</code> | ||
+ | |||
+ | returns a list like this: | ||
+ | <code> | ||
+ | 00:--:--:--:--:-- Alexxa | ||
+ | 00:--:--:--:--:-- NETGEAR | ||
+ | 00:--:--:--:--:-- UPC008034 | ||
+ | 00:--:--:--:--:-- UPC011853 | ||
+ | 00:--:--:--:--:-- UPC019652 | ||
+ | 00:--:--:--:--:-- bobi13 | ||
+ | bc:--:--:--:--:-- ASUS_lgdp | ||
+ | </code> | ||
+ | |||
+ | * ping all online IPs; with timeout | ||
<code> | <code> | ||
Line 74: | Line 91: | ||
(doesn't really continue once it reaches my own IP) | (doesn't really continue once it reaches my own IP) | ||
- | [[http://samsclass.info/124/proj11/123-P14x-promscan.html|Detecting Promiscuous NICs with scapy]] fun exercise, tried it with 2 wifi cards | + | * [[http://samsclass.info/124/proj11/123-P14x-promscan.html|Detecting Promiscuous NICs with scapy]] fun exercise, tried it with 2 wifi cards |