Skip to main content

Posts

Showing posts from 2017

Code To Create TCP packet header with Python socket module

Namaste Hackers,



Today, In this tutorial I am going to show you how you can easily create a raw TCP packet using python socket module and struct module.
Friend, If You Are New on our Blog, Then Don't Forget To Follow Us On Social Media Because We Create These Types of Tutorials in Every Small Gap of the week and of course, with social media, you can easily get updates of this blog or you can also directly connect with me on facebook.

In today's module basically, we going to play with socket modules. so, To Make you skill more familiar with python and socket module. You Can Also Read Our Other Networking Posts Also.


HTTP Sniffer Script In PythonPing Sweeper Script In PythonServer Banner Grabber Script In PythonLogin Page FinderSimple Packet SnifferCode IPv4 packet using socket

Or You Can Also Check Our Complete Project List Here


Introduction As we know, Many times for large networking project we have to write codes for creating raw networking packets without using any external …

What is the use of Pseudo header in TCP/UDP packets?

Namaste Friends,



In today's post, I am going to write about what is Pseudo header and why it is important to calculate CheckSum of TCP and UDP packets.


Let's Directly Focus On Our Important Questions.
Q 1. What is TCP/UDP Checksum? Ans. As we already know that our world wide web is very very big and there are billions of billions of packets are flowing on the network from one point to another point through different types of gateways, switches, router and IOT. So, The possibilities of errors or corruption in any packets are very high. Hence, this problem provides a solid reason to add the concept of checksum in TCP/UDP packets. Basically, Checksum is one of the types of the hash value calculated from the checksum algorithm. In Other Words, The TCP/IP checksum is simply used to detect the corruption of data over a TCP or IPv4 connection. As i already told you, corruption of data over internet network has high possibilities.  If a bit is flipped, a byte mangled, or some other bad…

Code To Create IPv4 packet header in Python

Namaste Hackers,



Today, In this tutorial I am going to show you how you can easily create a raw IP header packet using python socket module and struct module.
Friend, If You Are New on our Blog, Then Don't Forget To Follow Us On Social Media Because We Create These Types of Tutorials in Every Small Gap of the week and of course, with social media, you can easily get updates of this blog or you can also directly connect with me on facebook.

In today's module basically, we going to play with socket modules. so, To Make you skill more familiar with python and socket module. You Can Also Read Our Other Networking Posts Also.


HTTP Sniffer Script In PythonPing Sweeper Script In PythonServer Banner Grabber Script In PythonLogin Page FinderSimple Packet Sniffer

Or You Can Also Check Our Complete Project List Here


Introduction
Many times for large networking project we have to write codes for creating raw networking packets without using any external libraries or modules. And at that t…

How is TCP packet CheckSum Calculated? - Theory

Namaste Friends,



Today, I m going to share with you actual method to calculate the checksum of TCP header packet at the binary level.

Introduction Are you working on a networking project where you created TCP/UDP packets from scratch but don't know how to find checksum of from pseudo TCP packets? well, friend, you come to the right place. here, I am going to share with you the actual binary concept to calculate the checksum of pseudo TCP packets. Before starting this tutorial, I want to highlight that for this tutorial you need basic information of binary number operations.


How it works?
I am assuming that you already aware of TCP pseudo concept. basically, to calculate the checksum of TCP packet we need to create a TCP pseudo packet to calculate the actual checksum of TCP packet. if you don't know about pseudo concept then, I think you need to take a look here.

Now, let's focus on theory again. first, we have to divide and slice binary data into 16 bits pieces. After sli…

Buffer overflow Exploitation tutorial - Simple Stack Based Exploit - part 5

Namaste Hackers,




Introduction
Friends, This is my fifth part of buffer overflow exploitation and in this post, I am going to show you how we can play with the stack to buffer overflow program and then, we will also manipulate Stack Pointer to execute our favorite function from the same program.


So, Let's Start Our Tutorial With a quick revision of previous important point that going to help us to understand what actually happing under the hood.

If you already aware of this concept, Skip Part 1 and Part 2.
CPU Memory Management Device - Part 1
CPU Memory Management System - Part 2 

Pay Attention here,
CPU Memory Organization/Registers - Part 3
CPU Virtual Memory Model/Stack/heap - Part 4



Pre-Requested Skill 1. Basic Knowledge of Computer memory organization/registers/stack/head etc. (If you don't know, read above-provided posts carefully)
2. Intermediate Knowledge Of C.
3. Basic Knowledge Of x86 assembly
4. Little familiar with Linux commands, gcc, gdb and objdump.

Machine Require…

GDB tutorials - debug/disassemble C programs using gdb In Linux - Part 1

Namaste hackers,




Today, In this tutorial I am going to show you how we can debug programs using gdb in linux. if you want to learn exploitation, reverse programming, debugging of programs then friends, this tutorial is definitely very important for you. so, let's quickly start our today's topic.

Introduction
What is GDB?
Ans. Basically,  GDB is a Debuger program come pre-install in many *nix like systems. GDB provides the facilities to perform different types of function during execution of the targeted program that actually helps the user to analyze the program operations and also help the programmer to find problems in programs. With sharp knowledge of GDB and CPU hardware, any user can easily understand Compiled program execution function and various functions performed by the program.


Before starting our tutorial, I will suggest you to quickly install gdb-peda. This is one type of gdb extension that add extra facilities in gdb user interface.


To Quickly install it in Linux…

Related Post