This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Last revision Both sides next revision | ||
scapy-usage-examples [2012/08/03 14:20] 94.245.224.234 [examples] |
scapy-usage-examples [2012/08/03 15:33] 94.245.224.234 [examples] |
||
---|---|---|---|
Line 51: | Line 51: | ||
* [[http://www.packetstan.com/2011/03/extracting-ap-names-from-packet.html|PACKETSTAN: Extracting AP names from Packet Captures ]] | * [[http://www.packetstan.com/2011/03/extracting-ap-names-from-packet.html|PACKETSTAN: Extracting AP names from Packet Captures ]] | ||
+ | |||
+ | works great, extracts MAC addresses and ESSIDs found in a pcap file. | ||
+ | |||
+ | downloaded this script by Tim Medin; run it like this: | ||
+ | |||
+ | <code>./APNameFromPcap.py -f [a .pcap file] | sort -u</code> | ||
+ | |||
+ | returns a list like this: | ||
+ | <code> | ||
+ | 00:--:--:--:--:-- Alexxa | ||
+ | 00:--:--:--:--:-- NETGEAR | ||
+ | 00:--:--:--:--:-- UPC008034 | ||
+ | 00:--:--:--:--:-- UPC011853 | ||
+ | 00:--:--:--:--:-- UPC019652 | ||
+ | 00:--:--:--:--:-- bobi13 | ||
+ | bc:--:--:--:--:-- ASUS_lgdp | ||
+ | </code> | ||
* ping all online IPs; with timeout | * ping all online IPs; with timeout |