O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. IEEE 802.3 Wired Network Manipulation with Perl

In this chapter, we will write our own packet capturing and network manipulation tools using Perl programming. Up to this point, we have already written packet sniffing programs that disassemble packets to analyze their layers. We have also learned how to create Pcap syntax filters to capture only specific packets that meet our needs. The first section of this chapter is on packet capturing and takes us further into packet analysis and filtering. The second section, in which we learn more about network traffic manipulation, combines our passive packet sniffing with a more active approach. Finally, the last section brings the two together into a single Perl program.

Packet capturing

Manipulating ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required