{"id":5838,"date":"2013-02-28T10:59:04","date_gmt":"2013-02-28T13:59:04","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=5838"},"modified":"2019-07-16T14:26:39","modified_gmt":"2019-07-16T17:26:39","slug":"scapy","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2013\/02\/exploits\/scapy\/","title":{"rendered":"Scapy"},"content":{"rendered":"<p>Ol\u00e1 pessoal !!! Bem vindo ao site BackTrack Brasil !!!<\/p>\n<p>Neste pequeno tutorial apresentamos o Scapy.<\/p>\n<p style=\"text-align: justify;\">Scapy \u00e9 um programa de manipula\u00e7\u00e3o interativa poderosa de pacote. \u00c9 capaz de forjar ou decodificar os pacotes de um grande n\u00famero de protocolos, envi\u00e1-los, captur\u00e1-los, combinar as perguntas e respostas, e muito mais. Ele pode lidar facilmente com tarefas mais cl\u00e1ssicas, como a digitaliza\u00e7\u00e3o, tracerouting, sondagem, testes de unidade, ataques ou descoberta de rede (que pode substituir hping, 85% dos nmap, arpspoof, arp-sk, arping, tcpdump, tethereal, p0f, etc.) Ele tamb\u00e9m funciona muito bem em um monte de outras tarefas espec\u00edficas que a maioria das outras ferramentas n\u00e3o pode segurar, como o envio de quadros inv\u00e1lidos, injetando seus pr\u00f3prios quadros 802.11, combinando t\u00e9cnicas (VLAN hopping + envenenamento de cache ARP, VOIP decodifica\u00e7\u00e3o de canal criptografado WEP. ..), etc.<\/p>\n<p style=\"text-align: justify;\">Para captura de tr\u00e1fego de um host, digite o seguinte comando no prompt do Scapy:<\/p>\n<p align=\"LEFT\"><span style=\"font-size: large;\">&gt;&gt;&gt; sniff(filter=&#8221;tcp and host 192.168.1.18&#8243;, count=30)<\/span><\/p>\n<p style=\"text-align: center;\" align=\"LEFT\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/115.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5840\" title=\"1\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/115-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/115-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/115-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/115.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"LEFT\">Fig 1<\/p>\n<p align=\"LEFT\">Depois execute os seguintes comandos<\/p>\n<p align=\"LEFT\"><span style=\"font-size: large;\">&gt;&gt;&gt; a=_<\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-size: large;\">&gt;&gt;&gt; a.nsummary()<\/span><\/p>\n<p style=\"text-align: center;\" align=\"LEFT\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/214.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5841\" title=\"2\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/214-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/214-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/214-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/214.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"LEFT\">Fig 2<\/p>\n<p style=\"text-align: left;\" align=\"LEFT\">Este comando fareja os pr\u00f3ximos 10 pacotes trafegando na rede para o host 192.168.1.18<\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/311.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5842\" title=\"3\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/311-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/311-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/311-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/311.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 3<\/p>\n<p>&nbsp;<\/p>\n<p>Mudando o comando e alterando a fun\u00e7\u00e3o (count=60) farejaremos os pr\u00f3ximos 60 pacotes trafegando na rede para o host 192.168.1.18<\/p>\n<p align=\"JUSTIFY\"><span style=\"font-size: large;\">&gt;&gt;&gt; sniff(filter=&#8221;tcp and host 192.168.1.18&#8243;, count=60<\/span><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/410.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5843\" title=\"4\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/410-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/410-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/410-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/410.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 4<\/p>\n<p style=\"text-align: left;\" align=\"JUSTIFY\">Utilizando a fun\u00e7\u00e3o sprintf() \u00a0poderemos obter mais controle sobre o que \u00e9 exibido.<\/p>\n<p align=\"JUSTIFY\"><span style=\"font-size: large;\">&gt;&gt;&gt; pkts = sniff(prn=lambda x:x.sprintf(&#8220;{IP:%IP.src% -&gt; %IP.dst%\\n}{Raw:%Raw.load%\\n}&#8221;))<\/span><\/p>\n<p style=\"text-align: center;\">\u00a0<a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/59.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5844\" title=\"5\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/59-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/59-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/59-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/59.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 5<\/p>\n<p style=\"text-align: left;\">Podemos farejar qualquer porta, neste exemplo vamos farejar as portas 25 e 110 referente ao e-mail com o seguinte comando.<\/p>\n<p align=\"JUSTIFY\"><span style=\"font-size: large;\">&gt;&gt;&gt; a=sniff(filter=&#8221;tcp and ( port 25 or port 110 )&#8221;, prn=lambda x:x.sprintf(&#8220;%IP.src%:TCP. sport% -&gt; %IP.dst%:%TCP.dport% 2s, TCP.flags%:%TCP.payload%&#8221;))<\/span><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/67.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5845\" title=\"6\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/67-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/67-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/67-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/67.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 6<\/p>\n<p style=\"text-align: justify;\" align=\"JUSTIFY\">Com este comando farejamos os pacotes trafegados via TCP nas portas 25 e 110 . Usamos o operador lambda para denotar fun\u00e7\u00f5es an\u00f4nimas com a fun\u00e7\u00e3o sprintf(), afim de obtermos mais controle sobre as informa\u00e7\u00f5es apresentadas.<\/p>\n<p align=\"JUSTIFY\">Com o seguinte comando o Scapy fareja a interface eth0 ligada a uma rede externa.<\/p>\n<p align=\"JUSTIFY\"><span style=\"font-size: large;\">&gt;&gt; a=sniff(iface=&#8221;eth0&#8243;, prn=lambda x: x.summary())<\/span><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/711.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5848\" title=\"7\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/711-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/711-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/711-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/711.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 7<\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">\u00a0<span style=\"text-align: left;\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\" align=\"JUSTIFY\">Podemos mostrar a topologia da rede graficamente, atrav\u00e9s de um diagrama de fluxo de pacotes utilizando o m\u00e9todo conversations(). Neste caso, necessitamos dos programas ImageMagick e Graphviz.<\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/85.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5847\" title=\"8\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/85-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/85-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/85-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/85.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 8<\/p>\n<p style=\"text-align: left;\" align=\"JUSTIFY\">Podemos utilizar o mesmo comando para redes sem fio e atrav\u00e9s do gr\u00e1fico gerado verificarmos a topologia de rede.<\/p>\n<p align=\"LEFT\"><span style=\"font-size: large;\">&gt;&gt;&gt; a=sniff(iface=&#8221;wlan0&#8243;, prn=lambda x: x.summary())<\/span><\/p>\n<p align=\"LEFT\">\u00a0<span style=\"font-size: large;\">&gt;&gt;&gt; a.conversations()<\/span><\/p>\n<p align=\"LEFT\">Com o comando \u00a0ls() podemos listar os protocolos suportados pelo Scapy. Vejamos:<\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: large;\">&gt;&gt;&gt; ls()<\/span><\/span><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: large;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/94.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5853\" title=\"9\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/94-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/94-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/94-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/94.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 9<\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/9.1.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5854\" title=\"9.1\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/9.1-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/9.1-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/9.1-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/9.1.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 9.1<\/p>\n<p style=\"text-align: left;\" align=\"JUSTIFY\">Podemos listar a estrutura do segmento UDP, TCP, ICMP, etc.<\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: large;\">&gt;&gt;&gt; ls(UDP)<\/span><\/span><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/103.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5857\" title=\"10\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/103-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/103-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/103-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/103.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 10<\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: large;\">&gt;&gt;&gt; ls(TCP)<\/span><\/span><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/116.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5858\" title=\"11\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/116-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/116-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/116-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/116.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 11<\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: large;\">&gt;&gt;&gt; ls(ICMP)<\/span><\/span><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/122.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5859\" title=\"12\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/122-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/122-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/122-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/122.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 12<\/p>\n<p align=\"JUSTIFY\">Com o seguinte comando listamos os comandos do usu\u00e1rio.<\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: large;\">&gt;&gt;&gt; lsc()<\/span><\/span><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/132.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5860\" title=\"13\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/132-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/132-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/132-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/132.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 13<\/p>\n<p style=\"text-align: left;\" align=\"JUSTIFY\">Com Scapy podemos manipular os pacotes da camada 3 e envi\u00e1-los com a fun\u00e7\u00e3o send() lidando com roteamento de camada2. A Fun\u00e7\u00e3o sendp() trabalha na camada 2. No entanto precisamos escolher a interface correta.<\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/142.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5861\" title=\"14\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/142-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/142-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/142-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/142.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 14<\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/14.1.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5864\" title=\"14.1\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/14.1-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/14.1-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/14.1-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/14.1.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 14.1<\/p>\n<p style=\"text-align: justify;\" align=\"JUSTIFY\">Vamos fazer algo mais interessante que \u00e9 enviar e receber pacotes com Scapy. A fun\u00e7\u00e3o sr1() \u00e9 para enviar pacotes e receber respostas. Vamos ver que a fun\u00e7\u00e3o retorna um par de pacotes e respostas e os pacotes n\u00e3o respondidos. A fun\u00e7\u00e3o sr1() \u00e9 uma variante que retorna apenas um pacote que respondeu o pacote ou um conjunto de pacotes enviados. Os pacotes est\u00e3o na camada 3, como IP, ARP, etc. A fun\u00e7\u00e3o srp() faz o mesmo com os pacotes na camada 2, como Ethernet, 802.3, etc.<\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/151.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5866\" title=\"15\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/151-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/151-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/151-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/151.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 15<\/p>\n<p align=\"JUSTIFY\">Vamos aplicar uma recurs\u00e3o no DNS do roteador.<\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/161.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5867\" title=\"16\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/161-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/161-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/161-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/161.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 16<\/p>\n<p style=\"text-align: justify;\" align=\"JUSTIFY\">Finalizando vamos verificar como gerar um grupo de pacotes com extrema facilidade utilizando o Scapy. Estaremos aplicando um conjunto de pacotes utilizando um tipo de produto cartesiano com campos.<\/p>\n<p style=\"text-align: justify;\" align=\"JUSTIFY\">Desta forma, \u00e9 poss\u00edvel vermos a grande capacidade, desta ferramenta, pela qual consolida uma grande flexibilidade proporcionando uma varredura complexa e personalizada.<\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">\u00a0<a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/171.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5868\" title=\"17\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/171-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/171-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/171-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/171.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\" align=\"JUSTIFY\">Fig 17<\/p>\n<p>Um grande abra\u00e7o a todos e at\u00e9 a pr\u00f3xima !!!<\/p>\n<p>&nbsp;<\/p>\n\r\n\t\t<div class='author-shortcodes'>\r\n\t\t\t<div class='author-inner'>\r\n\t\t\t\t<div class='author-image'>\r\n\t\t\t<img src='https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2012-05-30-12.45.38-1143174_57x57.jpg' alt='' \/>\r\n\t\t\t<div class='author-overlay'><\/div>\r\n\t\t<\/div> <!-- .author-image --> \r\n\t\t<div class='author-info'>\r\n\t\t\t<p>By:<a href=\"http:\/\/www.grsecurity.com.br\" target=\"_blank\" rel=\"noopener noreferrer\">\u00a0<strong>Gerson Raymond<\/strong><\/a><\/p>\n<p style=\"text-align: justify;\">T\u00e9cnico em Contabilidade, T\u00e9cnico em Eletr\u00f4nica, T\u00e9cnico em Telecomunica\u00e7\u00f5es, Bacharel em Ci\u00eancia da Computa\u00e7\u00e3o, Administrador de Redes Linux (CentOS, XEN, Zabbix, Asterisk\/Elastix) e P\u00f3s-Graduando em <strong><a title=\"Mackenzie\" href=\"http:\/\/www.mackenzie.com.br\/seg_tec_informacao.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #800000;\">Seguran\u00e7a em Tecnologia da Informa\u00e7\u00e3o \u2013 UNIVERSIDADE MACKENZIE \u2013 SP<\/span><\/a><\/strong>.<\/p>\n<p>Homepage:\u00a0<span style=\"color: #800000;\"><strong><a title=\"Grsecurity\" href=\"http:\/\/www.grsecurity.com.br\/\"><span style=\"color: #800000;\">http:\/\/www.grsecurity.com.br<\/span><\/a><\/strong><\/span><\/p>\n<p><em>\u00a0<\/em>\r\n\t\t<\/div> <!-- .author-info --><\/p>\r\n\t\t\t<\/div> <!-- .author-inner -->\r\n\t\t<\/div> <!-- .author-shortcodes -->\n","protected":false},"excerpt":{"rendered":"<p>Ol\u00e1 pessoal !!! Bem vindo ao site BackTrack Brasil !!! Neste pequeno tutorial apresentamos o Scapy. Scapy \u00e9 um programa de manipula\u00e7\u00e3o interativa poderosa de pacote. \u00c9 capaz de forjar ou decodificar os pacotes de um grande n\u00famero de protocolos, envi\u00e1-los, captur\u00e1-los, combinar as perguntas e respostas, e muito mais. Ele pode lidar facilmente com [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5881,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100,21,101],"tags":[],"class_list":["post-5838","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-diversos","category-exploits","category-tutorial-backtrack"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/5838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=5838"}],"version-history":[{"count":34,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/5838\/revisions"}],"predecessor-version":[{"id":10515,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/5838\/revisions\/10515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/5881"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=5838"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=5838"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=5838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}