Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.
Switch branches/tags
Nothing to show
Clone or download
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
images Added image and changes to README Jun 20, 2017
LICENSE Create LICENSE Jun 12, 2017
README.md Changed subprocess read to subprocess communicate to avoid blocking. … Aug 29, 2017
pcrappyfuzzer.py No need for setuid root Aug 29, 2017
test.pcap Added test.pcap Jun 20, 2017

README.md

pcrappyfuzzer

pcrappyfuzzer.py: a very simple mash-up of Scapy + radamsa to extract data from a PCAP file and perform quick 'n dirty fuzzing ad infinitum.

Originally written for a penetration testing engagement, but modified to support the blog post "Fuzzing proprietary protocols with Scapy, radamsa and a handful of PCAPs" published in https://blog.blazeinfosec.com

Author

  • Julio Cesar Fort - julio at blazeinfosec dot com

Contributors

License

This project is licensed under the Apache License - see the LICENSE file for details

Copyright 2016-2017, Blaze Information Security https://www.blazeinfosec.com

Kudos

Thanks to the talented folks of Hackerstrip for the art used in our blog post.

Burning PCAPs