Elad Shapira
2008-05-05 18:16:43 UTC
Hello guys,
I'm about to give a lecture in an Infosec meeting and I choose to do a
gig on Scapy (around 40 min).
I thought to call it something like "15 cool things you can do with
Scapy" or something like that.
I'll be using a laptop that contains VMwares (one with Backtrack that
I will activate Scapy from and others if needed). A connection to the
internet will be supplied 2.
I thought of showing 10-15 cool stuff I can do with this cool
tool/framework/language.
I want to prepare 10-15 scenarios and off course scripts and commands,
I'll check there're all A-ok before my lecture.
I want it to be VERY hands on (one slide for beginning and one slide
in the end. Between those 2 slides only demonstrations)
I wanted to consult with you what and ask what do you think will be a.
Cool b. Interesting c. Technical
I thought showing how it replaces network utilities that we use
(Traceroute , ping) ,Pen test related stuff(Port scanning), sniffing ,
dos with spoofing etc.
I'm looking for out of the box scenarios that will extend the
boundaries of this tool.
If some hardware need to be prepared and brought (Access point, switch
etc) pls mention.
10x in advance for every idea you can share.
__________________
Zest
"Security, however, is an art, not a science. " - RFC 3631
I'm about to give a lecture in an Infosec meeting and I choose to do a
gig on Scapy (around 40 min).
I thought to call it something like "15 cool things you can do with
Scapy" or something like that.
I'll be using a laptop that contains VMwares (one with Backtrack that
I will activate Scapy from and others if needed). A connection to the
internet will be supplied 2.
I thought of showing 10-15 cool stuff I can do with this cool
tool/framework/language.
I want to prepare 10-15 scenarios and off course scripts and commands,
I'll check there're all A-ok before my lecture.
I want it to be VERY hands on (one slide for beginning and one slide
in the end. Between those 2 slides only demonstrations)
I wanted to consult with you what and ask what do you think will be a.
Cool b. Interesting c. Technical
I thought showing how it replaces network utilities that we use
(Traceroute , ping) ,Pen test related stuff(Port scanning), sniffing ,
dos with spoofing etc.
I'm looking for out of the box scenarios that will extend the
boundaries of this tool.
If some hardware need to be prepared and brought (Access point, switch
etc) pls mention.
10x in advance for every idea you can share.
__________________
Zest
"Security, however, is an art, not a science. " - RFC 3631