Skip to content

Instantly share code, notes, and snippets.

@scriptzteam
Forked from scramblr/spooftest.py
Created February 5, 2023 16:43
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save scriptzteam/1ee3f7904503b10f07fa6c02c415339f to your computer and use it in GitHub Desktop.
Save scriptzteam/1ee3f7904503b10f07fa6c02c415339f to your computer and use it in GitHub Desktop.
#!/usr/bin/python
#
# This is a small, simple script to test your server's abilities to spoof IPv4 packets or not.
# You should use this instead of things like caida project's tool, because they're rumored to
# collect data or hand it off to others who harass the server/network owners until they re-configure
# their networks and discontinue allowing spoofed packets.
#
# By default, this script sends spoofed packets to fuzzme.packet.tel - but it can be configured to
# send them anywhere. You can download a constantly running pcap by typing:
# wget http://fuzzme.packet.tel/fuzzme.packet.tel.last10minutes.pcap
# EDIT: packet.tel has been killed off for now, and also I think cock.li (my host) may be in some hot water,
# sooooo yeah. No fun utilities like fuzzme for now.
#
# Thank the White Knights of the Internet for all of this crap.
#
# Requires scapy and a spoofy box
#
# Enjoy!
# -SCRAMBLR
#
from scapy.all import *
howmany = 30 # Change this if u want
destination = "fuzzme.packet.tel" # u can also change this too!
message = "yes hello! this is an IPv4 packet header spoofing test from packet.tel's spoofboitest.py test tool!"
print("PACKET.TEL LLC - Spoofy Test Tool")
print("by SCRAMBLR (https://github.com/scramblr)\r\n\r\n")
print("[*] We're gonna be spoofing now!")
print("[*] How many packjets r we sending: ")
print(howmany)
print("[*] Where we sending deez spoofy bois to: ")
print(destination)
print("[*] Verifying fuzzme.packet.tel still lives on the internet with ICMP ping...")
send(IP(dst="fuzzme.packet.tel")/ICMP())
print("[*] Sending some spoofy packjets to da box!")
packjet = IP(src=RandIP(),dst=destination)/ICMP()/"SCRAMBLRWUZHERESCRAMBLRWUZHERESCRAMBLRWUZHERESCRAMBLRWUZHERE"
send(packjet,count=howmany)
print("[*] If you used the default fuzzme.packet.tel destination, you can")
print("[*] grab the most recent pcap from the server at:")
print("[*] http://fuzzme.packet.tel/fuzzme.packet.tel.last10minutes.pcap")
print("[*] If packet.tel is down, setup your own box and point it there instead.")
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment