Skip to content

Examples

himanshu edited this page Sep 5, 2023 · 19 revisions

Getting Started

Below is the workflow to get started on using a module and the respective sub-modules.

To invoke a module from the primary menu, use the index numbers denoted next to the module name.

$ sudo python3 byteosaurus_hex.py

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7):

For example to invoke the VXLAN module

  • Press 5 then hit Enter
  • Provide the number of flows you want to build, minimum 1 flow is required.
    • For each flow you will have the option to select the:
      • Number / count of packets to send
      • Egress / Outgoing interface from which the packets will be sent.
  • Select the sub-module from the menu option.
$ sudo python3 byteosaurus_hex.py

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 5
Enter the number of flows > 2

Building flow number [ 1 ]:

Packet Type:

1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP

Enter your choice (1-3) > 1
Generate random Vxlan ICMP Packet? (y/n) >

For detailed examples per module, please refer to the module specific documentation.

Module Examples

ICMP

The ICMP module allows users to generate following ICMP packets:

  • ICMP Echo Request
  • ICMP Echo Response

This module supports:

  • Multiple flows
  • Packet count & Outgoing interface per flow
  • Random automated packet generation
  • Full manual packet generation
  • Adding VLAN tags

ICMP Echo Request

Random packet generation

Reveal Output

$ sudo python3 byteosaurus_hex.py

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 1
Enter the number of flows > 1

Building flow number [ 1 ]:

Random ICMP Packet? (y/n) > y
ICMP Type (req/reply) > req
Count (c for continous) > 5
Source Interface > et48
2023-08-27 09:24:03,984: INFO: ICMP packet built
###[ Ethernet ]###
  dst       = e1:5e:04:ef:37:6f
  src       = c4:ca:2b:b1:f6:39
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     =
     frag      = 0
     ttl       = 162
     proto     = icmp
     chksum    = None
     src       = 172.17.229.151
     dst       = 172.29.92.217
     \options   \
###[ ICMP ]###
        type      = echo-request
        code      = 0
        chksum    = None
        id        = 0x5ff
        seq       = 0x0
        unused    = ''
###[ Raw ]###
           load      = 'Ȭ8Ԃ\\xd3~\x1dυ\\xfb\\xbfǜ\\xd7H\\x8c\\xeb\\xd8,\\x87\\x90R\\xbbfLj5k\\xe1\\xbe}\\xd6/aa\\xc7\\xfd>U7\\xeaT\\x92_\\xb5l\\x9c\\xaem\\xd9\\xeb\\xf7\\xe7lv5\\x8f\\xebؕ 2_'

2023-08-27 09:24:03,985: INFO: Sending out all flows
2023-08-27 09:24:04,030: INFO: Done sending all flows
2023-08-27 09:24:04,063: INFO: Module completed
Reveal Packet

Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: e1:5e:04:ef:37:6f (e1:5e:04:ef:37:6f)
    Destination: e1:5e:04:ef:37:6f (e1:5e:04:ef:37:6f)
    Source: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 172.17.229.151, Dst: 172.29.92.217
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 92
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 162
    Protocol: ICMP (1)
    Header Checksum: 0x7e00 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 172.17.229.151
    Destination Address: 172.29.92.217
Internet Control Message Protocol
    Type: 8 (Echo (ping) request)
    Code: 0
    Checksum: 0xdecb [correct]
    [Checksum Status: Good]
    Identifier (BE): 1535 (0x05ff)
    Identifier (LE): 65285 (0xff05)
    Sequence Number (BE): 0 (0x0000)
    Sequence Number (LE): 0 (0x0000)
    [No response seen]
    Data (64 bytes)

ICMP Echo Response

Manual packet generation with VLAN Tag

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 1
Enter the number of flows > 1

Building flow number [ 1 ]:

Random ICMP Packet? (y/n) > n
ICMP Type (req/reply) > reply
Source MAC (de:ad:be:ef:ca:fe) > 00:1c:58:23:64:c1
Destination MAC > 00:15:62:64:33:41
Source IP > 192.168.14.10
Destination IP > 192.168.14.20
TTL > 10
Tag (y/n) > y
VLAN Tag (x,y) > 1,20
Count (c for continous) > 5
Source Interface > et48
2023-08-27 09:49:54,678: INFO: ICMP Packet built
###[ Ethernet ]###
  dst       = 00:15:62:64:33:41
  src       = 00:1c:58:23:64:c1
  type      = n_802_1Q
###[ 802.1Q ]###
     prio      = 0
     id        = 0
     vlan      = 1
     type      = n_802_1Q
###[ 802.1Q ]###
        prio      = 0
        id        = 0
        vlan      = 20
        type      = IPv4
###[ IP ]###
           version   = 4
           ihl       = None
           tos       = 0x0
           len       = None
           id        = 1
           flags     =
           frag      = 0
           ttl       = 10
           proto     = icmp
           chksum    = None
           src       = 192.168.14.10
           dst       = 192.168.14.20
           \options   \
###[ ICMP ]###
              type      = echo-reply
              code      = 0
              chksum    = None
              id        = 0x70c
              seq       = 0x0
              unused    = ''
###[ Raw ]###
                 load      = '\\xabqT\\x8a\\x85.fF\\xf64\\xbf:e\\xdcgb\x15\\xa5-\\xfaDZz\\x83\\xfa\\xe6\\xa90\\xd9\\xe0\\xcf\n@\n\x10\\xef\'\\xf9\\xa5\\xd0L\\x80\\xdc\\xc4L"\\xf4\\xf8\x0ef+\\xfb\\xa8_\\xeaꔖ\\x94\x06%\\xe16i'

2023-08-27 09:49:54,679: INFO: Sending out all flows
2023-08-27 09:49:54,730: INFO: Done sending all flows
2023-08-27 09:49:54,762: INFO: Module completed
Reveal Packet

Ethernet II, Src: Cisco_23:64:c1 (00:1c:58:23:64:c1), Dst: Cisco_64:33:41 (00:15:62:64:33:41)
    Destination: Cisco_64:33:41 (00:15:62:64:33:41)
    Source: Cisco_23:64:c1 (00:1c:58:23:64:c1)
    Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 1
    000. .... .... .... = Priority: Best Effort (default) (0)
    ...0 .... .... .... = DEI: Ineligible
    .... 0000 0000 0001 = ID: 1
    Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 20
    000. .... .... .... = Priority: Best Effort (default) (0)
    ...0 .... .... .... = DEI: Ineligible
    .... 0000 0001 0100 = ID: 20
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.14.10, Dst: 192.168.14.20
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 92
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 10
    Protocol: ICMP (1)
    Header Checksum: 0x1332 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.14.10
    Destination Address: 192.168.14.20
Internet Control Message Protocol
    Type: 0 (Echo (ping) reply)
    Code: 0
    Checksum: 0xdc45 [correct]
    [Checksum Status: Good]
    Identifier (BE): 1804 (0x070c)
    Identifier (LE): 3079 (0x0c07)
    Sequence Number (BE): 0 (0x0000)
    Sequence Number (LE): 0 (0x0000)
    Data (64 bytes)

ARP

The ARP module allows users to generate following ARP packets:

  • ARP Request
  • ARP Reply

This module supports:

  • Multiple flows
  • Packet count & Outgoing interface per flow
  • Random automated packet generation
  • Full manual packet generation
  • Adding VLAN tags

ARP Request

Random packet generation

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 2
Enter the number of flows > 1

Building flow number [ 1 ]:

Generate random ARP Packet? (y/n) > y
ARP Type (req/resp) > req
Count (c for continous) > 5
Source Interface > et48
2023-08-27 10:22:42,431: INFO: ARP packet built
###[ Ethernet ]###
  dst       = ff:ff:ff:ff:ff:ff
  src       = c4:ca:2b:b1:f6:39
  type      = ARP
###[ ARP ]###
     hwtype    = Ethernet (10Mb)
     ptype     = IPv4
     hwlen     = None
     plen      = None
     op        = who-has
     hwsrc     = c4:ca:2b:b1:f6:39
     psrc      = 172.30.244.205
     hwdst     = 00:00:00:00:00:00
     pdst      = 172.16.68.167

2023-08-27 10:22:42,432: INFO: Sending out all flows
2023-08-27 10:22:42,474: INFO: Done sending all flows
2023-08-27 10:22:42,509: INFO: Module completed
Reveal Packet

Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
    Destination: Broadcast (ff:ff:ff:ff:ff:ff)
    Source: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
    Type: ARP (0x0806)
Address Resolution Protocol (request)
    Hardware type: Ethernet (1)
    Protocol type: IPv4 (0x0800)
    Hardware size: 6
    Protocol size: 4
    Opcode: request (1)
    Sender MAC address: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
    Sender IP address: 172.30.244.205
    Target MAC address: 00:00:00_00:00:00 (00:00:00:00:00:00)
    Target IP address: 172.16.68.167

ARP Response

Manual packet generation with VLAN Tag

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 2
Enter the number of flows > 1

Building flow number [ 1 ]:

Generate random ARP Packet? (y/n) > n
ARP Type (req/resp) > resp
Source MAC (de:ad:be:ef:ca:fe) > 00:1d:09:f0:92:ab
Destination MAC > 00:1a:6b:6c:0c:cc
Sender MAC > 00:1d:09:f0:92:ab
Sender IP > 10.10.10.1
Target MAC > 00:1a:6b:6c:0c:cc
Target IP > 10.10.10.2
Tag (y/n) > y
VLAN Tag (x,y) > 20
Count (c for continous) > 5
Source Interface > et48
2023-08-27 10:27:29,750: INFO: ARP packet built
###[ Ethernet ]###
  dst       = 00:1a:6b:6c:0c:cc
  src       = 00:1d:09:f0:92:ab
  type      = n_802_1Q
###[ 802.1Q ]###
     prio      = 0
     id        = 0
     vlan      = 20
     type      = ARP
###[ ARP ]###
        hwtype    = Ethernet (10Mb)
        ptype     = IPv4
        hwlen     = None
        plen      = None
        op        = is-at
        hwsrc     = 00:1d:09:f0:92:ab
        psrc      = 10.10.10.1
        hwdst     = 00:1a:6b:6c:0c:cc
        pdst      = 10.10.10.2

2023-08-27 10:27:29,751: INFO: Sending out all flows
2023-08-27 10:27:29,802: INFO: Done sending all flows
2023-08-27 10:27:29,835: INFO: Module completed
Reveal Packet

Ethernet II, Src: Dell_f0:92:ab (00:1d:09:f0:92:ab), Dst: Universa_6c:0c:cc (00:1a:6b:6c:0c:cc)
    Destination: Universa_6c:0c:cc (00:1a:6b:6c:0c:cc)
    Source: Dell_f0:92:ab (00:1d:09:f0:92:ab)
    Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 20
    000. .... .... .... = Priority: Best Effort (default) (0)
    ...0 .... .... .... = DEI: Ineligible
    .... 0000 0001 0100 = ID: 20
    Type: ARP (0x0806)
Address Resolution Protocol (reply)
    Hardware type: Ethernet (1)
    Protocol type: IPv4 (0x0800)
    Hardware size: 6
    Protocol size: 4
    Opcode: reply (2)
    Sender MAC address: Dell_f0:92:ab (00:1d:09:f0:92:ab)
    Sender IP address: 10.10.10.1
    Target MAC address: Universa_6c:0c:cc (00:1a:6b:6c:0c:cc)
    Target IP address: 10.10.10.2

IGMP

The IGMP module allows users to generate following IGMP packets:

  • v1
    • Membership Query
    • Membership Report
  • v2
    • Membership Query, General
    • Membership Query, Group-Specific
    • Membership Report
    • Leave Group
  • v3
    • Membership Query, General
    • Membership Query, Group-Specific
    • Membership Query, Group-and-Source-Specific
    • Membership Report
    • Leave Group

This module supports:

  • Multiple flows
  • Packet count & Outgoing interface per flow
  • Adding VLAN tags

IGMP v1

Membership Query

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 3
Enter the number of flows > 1

Building flow number [ 1 ]:

IGMP Version (v1/v2/v3) > v1

IGMP Message Type:

1 -- Membership Query
2 -- Membership Report

Enter your choice (1-2) > 1
Sender MAC (de:ad:be:ef:ca:fe) > c4:ca:2b:b1:f6:39
Sender IP > 192.168.14.10
Tag (y/n) > n
Count (c for continous) > 5
Source Interface > et48
2023-08-27 10:39:04,770: INFO: IGMPv1 Membership Query Built
###[ Ethernet ]###
  dst       = 01:00:5e:00:00:01
  src       = c4:ca:2b:b1:f6:39
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     =
     frag      = 0
     ttl       = 1
     proto     = igmp
     chksum    = None
     src       = 192.168.14.10
     dst       = 224.0.0.1
     \options   \
      |###[ IP Option Router Alert ]###
      |  copy_flag = 1
      |  optclass  = control
      |  option    = router_alert
      |  length    = 4
      |  alert     = router_shall_examine_packet
###[ IGMP ]###
        type      = Group Membership Query
        mrcode    = 0
        chksum    = None
        gaddr     = 0.0.0.0

2023-08-27 10:39:04,772: INFO: Sending out all flows
2023-08-27 10:39:04,814: INFO: Done sending all flows
2023-08-27 10:39:04,848: INFO: Module completed
Reveal Packet

Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: IPv4mcast_01 (01:00:5e:00:00:01)
    Destination: IPv4mcast_01 (01:00:5e:00:00:01)
    Source: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.14.10, Dst: 224.0.0.1
    0100 .... = Version: 4
    .... 0110 = Header Length: 24 bytes (6)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 32
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 1
    Protocol: IGMP (2)
    Header Checksum: 0x7623 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.14.10
    Destination Address: 224.0.0.1
    Options: (4 bytes), Router Alert
Internet Group Management Protocol
    [IGMP Version: 1]
    Type: Membership Query (0x11)
    Reserved: 00
    Checksum: 0xeeff [correct]
    [Checksum Status: Good]
    Multicast Address: 0.0.0.0

Membership Report

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 3
Enter the number of flows > 1

Building flow number [ 1 ]:

IGMP Version (v1/v2/v3) > v1

IGMP Message Type:

1 -- Membership Query
2 -- Membership Report

Enter your choice (1-2) > 2
Sender MAC (de:ad:be:ef:ca:fe) > fa:16:3e:35:d1:43
Sender IP > 192.168.14.20
Multicast Address > 239.1.1.1
Tag (y/n) > y
VLAN Tag (x,y) > 10
Count (c for continous) > 5
Source Interface > et48
2023-08-27 10:43:11,658: INFO: IGMPv1 Membership Report
###[ Ethernet ]###
  dst       = 01:00:5e:01:01:01
  src       = fa:16:3e:35:d1:43
  type      = n_802_1Q
###[ 802.1Q ]###
     prio      = 0
     id        = 0
     vlan      = 10
     type      = IPv4
###[ IP ]###
        version   = 4
        ihl       = None
        tos       = 0x0
        len       = None
        id        = 1
        flags     =
        frag      = 0
        ttl       = 1
        proto     = igmp
        chksum    = None
        src       = 192.168.14.20
        dst       = 239.1.1.1
        \options   \
         |###[ IP Option Router Alert ]###
         |  copy_flag = 1
         |  optclass  = control
         |  option    = router_alert
         |  length    = 4
         |  alert     = router_shall_examine_packet
###[ IGMP ]###
           type      = Version 1 - Membership Report
           mrcode    = 0
           chksum    = None
           gaddr     = 239.1.1.1

2023-08-27 10:43:11,659: INFO: Sending out all flows
2023-08-27 10:43:11,698: INFO: Done sending all flows
2023-08-27 10:43:11,733: INFO: Module completed
Reveal Packet

Ethernet II, Src: fa:16:3e:35:d1:43 (fa:16:3e:35:d1:43), Dst: IPv4mcast_01:01:01 (01:00:5e:01:01:01)
    Destination: IPv4mcast_01:01:01 (01:00:5e:01:01:01)
    Source: fa:16:3e:35:d1:43 (fa:16:3e:35:d1:43)
    Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 10
    000. .... .... .... = Priority: Best Effort (default) (0)
    ...0 .... .... .... = DEI: Ineligible
    .... 0000 0000 1010 = ID: 10
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.14.20, Dst: 239.1.1.1
    0100 .... = Version: 4
    .... 0110 = Header Length: 24 bytes (6)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 32
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 1
    Protocol: IGMP (2)
    Header Checksum: 0x6618 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.14.20
    Destination Address: 239.1.1.1
    Options: (4 bytes), Router Alert
Internet Group Management Protocol
    [IGMP Version: 1]
    Type: Membership Report (0x12)
    Reserved: 00
    Checksum: 0xfdfc [correct]
    [Checksum Status: Good]
    Multicast Address: 239.1.1.1

IGMP v2

Membership Query, General

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 3
Enter the number of flows > 1

Building flow number [ 1 ]:

IGMP Version (v1/v2/v3) > v2

IGMP Message Type:

1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Report
4 -- Leave Group

Enter your choice (1-4) > 1
Sender MAC (de:ad:be:ef:ca:fe) > 00:1b:11:10:26:11
Sender IP > 192.168.1.2
Tag (y/n) > n
Count (c for continous) > 5
Source Interface > et48
2023-08-28 11:48:45,172: INFO: IGMPv2 Membership Query Built
###[ Ethernet ]###
  dst       = 01:00:5e:00:00:01
  src       = 00:1b:11:10:26:11
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     =
     frag      = 0
     ttl       = 1
     proto     = igmp
     chksum    = None
     src       = 192.168.1.2
     dst       = 224.0.0.1
     \options   \
      |###[ IP Option Router Alert ]###
      |  copy_flag = 1
      |  optclass  = control
      |  option    = router_alert
      |  length    = 4
      |  alert     = router_shall_examine_packet
###[ IGMP ]###
        type      = Group Membership Query
        mrcode    = 20
        chksum    = None
        gaddr     = 0.0.0.0

2023-08-28 11:48:45,173: INFO: Sending out all flows
2023-08-28 11:48:45,214: INFO: Done sending all flows
2023-08-28 11:48:45,249: INFO: Module completed
Reveal Packet

Ethernet II, Src: D-Link_10:26:11 (00:1b:11:10:26:11), Dst: IPv4mcast_01 (01:00:5e:00:00:01)
    Destination: IPv4mcast_01 (01:00:5e:00:00:01)
    Source: D-Link_10:26:11 (00:1b:11:10:26:11)
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 224.0.0.1
    0100 .... = Version: 4
    .... 0110 = Header Length: 24 bytes (6)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 32
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 1
    Protocol: IGMP (2)
    Header Checksum: 0x832b [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.1.2
    Destination Address: 224.0.0.1
    Options: (4 bytes), Router Alert
Internet Group Management Protocol
    [IGMP Version: 2]
    Type: Membership Query (0x11)
    Max Resp Time: 2.0 sec (0x14)
    Checksum: 0xeeeb [correct]
    [Checksum Status: Good]
    Multicast Address: 0.0.0.0

Membership Query, Group-Specific

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 3
Enter the number of flows > 1

Building flow number [ 1 ]:

IGMP Version (v1/v2/v3) > v2

IGMP Message Type:

1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Report
4 -- Leave Group

Enter your choice (1-4) > 2
Sender MAC (de:ad:be:ef:ca:fe) > 00:1b:11:10:26:11
Sender IP > 192.168.1.3
Multicast Address > 239.255.255.240
Tag (y/n) > y
VLAN Tag (x,y) > 10
Count (c for continous) > 5
Source Interface > et48
2023-08-28 11:51:27,134: INFO: IGMPv2 Membership Query, Group specific
###[ Ethernet ]###
  dst       = 01:00:5e:7f:ff:f0
  src       = 00:1b:11:10:26:11
  type      = n_802_1Q
###[ 802.1Q ]###
     prio      = 0
     id        = 0
     vlan      = 10
     type      = IPv4
###[ IP ]###
        version   = 4
        ihl       = None
        tos       = 0x0
        len       = None
        id        = 1
        flags     =
        frag      = 0
        ttl       = 1
        proto     = igmp
        chksum    = None
        src       = 192.168.1.3
        dst       = 239.255.255.240
        \options   \
         |###[ IP Option Router Alert ]###
         |  copy_flag = 1
         |  optclass  = control
         |  option    = router_alert
         |  length    = 4
         |  alert     = router_shall_examine_packet
###[ IGMP ]###
           type      = Group Membership Query
           mrcode    = 20
           chksum    = None
           gaddr     = 239.255.255.240

2023-08-28 11:51:27,135: INFO: Sending out all flows
2023-08-28 11:51:27,182: INFO: Done sending all flows
2023-08-28 11:51:27,219: INFO: Module completed
Reveal Packet

Frame 24: 50 bytes on wire (400 bits), 50 bytes captured (400 bits) on interface -, id 0
Ethernet II, Src: D-Link_10:26:11 (00:1b:11:10:26:11), Dst: IPv4mcast_7f:ff:f0 (01:00:5e:7f:ff:f0)
    Destination: IPv4mcast_7f:ff:f0 (01:00:5e:7f:ff:f0)
    Source: D-Link_10:26:11 (00:1b:11:10:26:11)
    Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 10
Internet Protocol Version 4, Src: 192.168.1.3, Dst: 239.255.255.240
    0100 .... = Version: 4
    .... 0110 = Header Length: 24 bytes (6)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 32
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 1
    Protocol: IGMP (2)
    Header Checksum: 0x733b [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.1.3
    Destination Address: 239.255.255.240
    Options: (4 bytes), Router Alert
Internet Group Management Protocol
    [IGMP Version: 2]
    Type: Membership Query (0x11)
    Max Resp Time: 2.0 sec (0x14)
    Checksum: 0xfefa [correct]
    [Checksum Status: Good]
    Multicast Address: 239.255.255.240

Membership Report

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 3
Enter the number of flows > 1

Building flow number [ 1 ]:

IGMP Version (v1/v2/v3) > v2

IGMP Message Type:

1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Report
4 -- Leave Group

Enter your choice (1-4) > 3
Sender MAC (de:ad:be:ef:ca:fe) > 00:1b:11:10:26:11
Sender IP > 192.168.1.3
Multicast Address > 225.1.1.4
Tag (y/n) > n
Count (c for continous) > 5
Source Interface > et48
2023-08-28 11:55:05,699: INFO: IGMPv2 Membership Report
###[ Ethernet ]###
  dst       = 01:00:5e:01:01:04
  src       = 00:1b:11:10:26:11
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     =
     frag      = 0
     ttl       = 1
     proto     = igmp
     chksum    = None
     src       = 192.168.1.3
     dst       = 225.1.1.4
     \options   \
      |###[ IP Option Router Alert ]###
      |  copy_flag = 1
      |  optclass  = control
      |  option    = router_alert
      |  length    = 4
      |  alert     = router_shall_examine_packet
###[ IGMP ]###
        type      = Version 2 - Membership Report
        mrcode    = 0
        chksum    = None
        gaddr     = 225.1.1.4

2023-08-28 11:55:05,699: INFO: Sending out all flows
2023-08-28 11:55:05,738: INFO: Done sending all flows
2023-08-28 11:55:05,770: INFO: Module completed
Reveal Packet

Ethernet II, Src: D-Link_10:26:11 (00:1b:11:10:26:11), Dst: IPv4mcast_01:01:04 (01:00:5e:01:01:04)
    Destination: IPv4mcast_01:01:04 (01:00:5e:01:01:04)
    Source: D-Link_10:26:11 (00:1b:11:10:26:11)
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.3, Dst: 225.1.1.4
    0100 .... = Version: 4
    .... 0110 = Header Length: 24 bytes (6)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 32
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 1
    Protocol: IGMP (2)
    Header Checksum: 0x8126 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.1.3
    Destination Address: 225.1.1.4
    Options: (4 bytes), Router Alert
Internet Group Management Protocol
    [IGMP Version: 2]
    Type: Membership Report (0x16)
    Max Resp Time: 0.0 sec (0x00)
    Checksum: 0x07fa [correct]
    [Checksum Status: Good]
    Multicast Address: 225.1.1.4

Leave Group

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 3
Enter the number of flows > 1

Building flow number [ 1 ]:

IGMP Version (v1/v2/v3) > v2

IGMP Message Type:

1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Report
4 -- Leave Group

Enter your choice (1-4) > 4
Sender MAC (de:ad:be:ef:ca:fe) > 00:1b:11:10:26:11
Sender IP > 192.168.1.5
Multicast Address > 225.1.1.4
Tag (y/n) > y
VLAN Tag > 20
Count (c for continous) > 5
Source Interface > et48
2023-08-28 11:57:04,380: INFO: IGMPv2 Leave Message
###[ Ethernet ]###
  dst       = 01:00:5e:00:00:02
  src       = 00:1b:11:10:26:11
  type      = n_802_1Q
###[ 802.1Q ]###
     prio      = 0
     id        = 0
     vlan      = 20
     type      = IPv4
###[ IP ]###
        version   = 4
        ihl       = None
        tos       = 0x0
        len       = None
        id        = 1
        flags     =
        frag      = 0
        ttl       = 1
        proto     = igmp
        chksum    = None
        src       = 192.168.1.5
        dst       = 224.0.0.2
        \options   \
         |###[ IP Option Router Alert ]###
         |  copy_flag = 1
         |  optclass  = control
         |  option    = router_alert
         |  length    = 4
         |  alert     = router_shall_examine_packet
###[ IGMP ]###
           type      = Leave Group
           mrcode    = 0
           chksum    = None
           gaddr     = 225.1.1.4

2023-08-28 11:57:04,381: INFO: Sending out all flows
2023-08-28 11:57:04,454: INFO: Done sending all flows
2023-08-28 11:57:04,487: INFO: Module completed
Reveal Packet

Ethernet II, Src: D-Link_10:26:11 (00:1b:11:10:26:11), Dst: IPv4mcast_02 (01:00:5e:00:00:02)
    Destination: IPv4mcast_02 (01:00:5e:00:00:02)
    Source: D-Link_10:26:11 (00:1b:11:10:26:11)
    Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 20
    000. .... .... .... = Priority: Best Effort (default) (0)
    ...0 .... .... .... = DEI: Ineligible
    .... 0000 0001 0100 = ID: 20
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.5, Dst: 224.0.0.2
    0100 .... = Version: 4
    .... 0110 = Header Length: 24 bytes (6)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 32
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 1
    Protocol: IGMP (2)
    Header Checksum: 0x8327 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.1.5
    Destination Address: 224.0.0.2
    Options: (4 bytes), Router Alert
Internet Group Management Protocol
    [IGMP Version: 2]
    Type: Leave Group (0x17)
    Max Resp Time: 0.0 sec (0x00)
    Checksum: 0x06fa [correct]
    [Checksum Status: Good]
    Multicast Address: 225.1.1.4

IGMP v3

Membership Query, General

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 3
Enter the number of flows > 1

Building flow number [ 1 ]:

IGMP Version (v1/v2/v3) > v3

IGMP Message Type:

1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Query, Group-and-Source-Specific
4 -- Membership Report
5 -- Leave Group

Enter your choice (1-5) > 1
Sender MAC (de:ad:be:ef:ca:fe) > 00:26:44:6c:1e:da
Sender IP > 192.168.1.25
Tag (y/n) > n
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:10:34,991: INFO: IGMPv3 Membership Query Built
###[ Ethernet ]###
  dst       = 01:00:5e:00:00:01
  src       = 00:26:44:6c:1e:da
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0xc0
     len       = None
     id        = 1
     flags     =
     frag      = 0
     ttl       = 1
     proto     = igmp
     chksum    = None
     src       = 192.168.1.25
     dst       = 224.0.0.1
     \options   \
      |###[ IP Option Router Alert ]###
      |  copy_flag = 1
      |  optclass  = control
      |  option    = router_alert
      |  length    = 4
      |  alert     = router_shall_examine_packet
###[ IGMPv3 ]###
        type      = Membership Query
        mrcode    = 20
        chksum    = None
###[ IGMPv3mq ]###
           gaddr     = 0.0.0.0
           resv      = 0
           s         = 0
           qrv       = 0
           qqic      = 0
           numsrc    = None
           srcaddrs  = []

2023-08-28 12:10:34,992: INFO: Sending out all flows
2023-08-28 12:10:35,038: INFO: Done sending all flows
2023-08-28 12:10:35,071: INFO: Module completed
Reveal Packet

Ethernet II, Src: ThomsonT_6c:1e:da (00:26:44:6c:1e:da), Dst: IPv4mcast_01 (01:00:5e:00:00:01)
    Destination: IPv4mcast_01 (01:00:5e:00:00:01)
    Source: ThomsonT_6c:1e:da (00:26:44:6c:1e:da)
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.25, Dst: 224.0.0.1
    0100 .... = Version: 4
    .... 0110 = Header Length: 24 bytes (6)
    Differentiated Services Field: 0xc0 (DSCP: CS6, ECN: Not-ECT)
    Total Length: 36
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 1
    Protocol: IGMP (2)
    Header Checksum: 0x8250 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.1.25
    Destination Address: 224.0.0.1
    Options: (4 bytes), Router Alert
Internet Group Management Protocol
    [IGMP Version: 3]
    Type: Membership Query (0x11)
    Max Resp Time: 2.0 sec (0x14)
    Checksum: 0xeeeb [correct]
    [Checksum Status: Good]
    Multicast Address: 0.0.0.0
    .... 0... = S: Do not suppress router side processing
    .... .000 = QRV: 0
    QQIC: 0
    Num Src: 0

Membership Query, Group-Specific

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 3
Enter the number of flows > 1

Building flow number [ 1 ]:

IGMP Version (v1/v2/v3) > v3

IGMP Message Type:

1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Query, Group-and-Source-Specific
4 -- Membership Report
5 -- Leave Group

Enter your choice (1-5) > 2
Sender MAC (de:ad:be:ef:ca:fe) > 00:1b:11:10:26:11
Sender IP > 192.168.12.10
Multicast Address > 225.1.1.3
Tag (y/n) > n
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:12:46,734: INFO: IGMPv3 Membership Query, Group specific
###[ Ethernet ]###
  dst       = 01:00:5e:01:01:03
  src       = 00:1b:11:10:26:11
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0xc0
     len       = None
     id        = 1
     flags     =
     frag      = 0
     ttl       = 1
     proto     = igmp
     chksum    = None
     src       = 192.168.12.10
     dst       = 225.1.1.3
     \options   \
      |###[ IP Option Router Alert ]###
      |  copy_flag = 1
      |  optclass  = control
      |  option    = router_alert
      |  length    = 4
      |  alert     = router_shall_examine_packet
###[ IGMPv3 ]###
        type      = Membership Query
        mrcode    = 20
        chksum    = None
###[ IGMPv3mq ]###
           gaddr     = 225.1.1.3
           resv      = 0
           s         = 0
           qrv       = 0
           qqic      = 0
           numsrc    = None
           srcaddrs  = []

2023-08-28 12:12:46,735: INFO: Sending out all flows
2023-08-28 12:12:46,794: INFO: Done sending all flows
2023-08-28 12:12:46,827: INFO: Module completed
Reveal Packet

Ethernet II, Src: D-Link_10:26:11 (00:1b:11:10:26:11), Dst: IPv4mcast_01:01:03 (01:00:5e:01:01:03)
    Destination: IPv4mcast_01:01:03 (01:00:5e:01:01:03)
    Source: D-Link_10:26:11 (00:1b:11:10:26:11)
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.12.10, Dst: 225.1.1.3
    0100 .... = Version: 4
    .... 0110 = Header Length: 24 bytes (6)
    Differentiated Services Field: 0xc0 (DSCP: CS6, ECN: Not-ECT)
    Total Length: 36
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 1
    Protocol: IGMP (2)
    Header Checksum: 0x755c [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.12.10
    Destination Address: 225.1.1.3
    Options: (4 bytes), Router Alert
Internet Group Management Protocol
    [IGMP Version: 3]
    Type: Membership Query (0x11)
    Max Resp Time: 2.0 sec (0x14)
    Checksum: 0x0ce7 [correct]
    [Checksum Status: Good]
    Multicast Address: 225.1.1.3
    .... 0... = S: Do not suppress router side processing
    .... .000 = QRV: 0
    QQIC: 0
    Num Src: 0

Membership Query, Group-and-Source-Specific

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 3
Enter the number of flows > 1

Building flow number [ 1 ]:

IGMP Version (v1/v2/v3) > v3

IGMP Message Type:

1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Query, Group-and-Source-Specific
4 -- Membership Report
5 -- Leave Group

Enter your choice (1-5) > 3
Sender MAC (de:ad:be:ef:ca:fe) > fa:16:3e:e4:d3:de
Sender IP > 192.168.1.1
Multicast Address > 239.1.1.1
Source Address > 1.1.1.1
Tag (y/n) > n
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:15:35,469: INFO: IGMPv3 Membership Query, Group & Source specific
###[ Ethernet ]###
  dst       = 01:00:5e:01:01:01
  src       = fa:16:3e:e4:d3:de
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0xc0
     len       = None
     id        = 1
     flags     =
     frag      = 0
     ttl       = 1
     proto     = igmp
     chksum    = None
     src       = 192.168.1.1
     dst       = 239.1.1.1
     \options   \
      |###[ IP Option Router Alert ]###
      |  copy_flag = 1
      |  optclass  = control
      |  option    = router_alert
      |  length    = 4
      |  alert     = router_shall_examine_packet
###[ IGMPv3 ]###
        type      = Membership Query
        mrcode    = 20
        chksum    = None
###[ IGMPv3mq ]###
           gaddr     = 239.1.1.1
           resv      = 0
           s         = 0
           qrv       = 0
           qqic      = 0
           numsrc    = 1
           srcaddrs  = [1.1.1.1]

2023-08-28 12:15:35,470: INFO: Sending out all flows
2023-08-28 12:15:35,514: INFO: Done sending all flows
2023-08-28 12:15:35,548: INFO: Module completed
Reveal Packet

Ethernet II, Src: fa:16:3e:e4:d3:de (fa:16:3e:e4:d3:de), Dst: IPv4mcast_01:01:01 (01:00:5e:01:01:01)
    Destination: IPv4mcast_01:01:01 (01:00:5e:01:01:01)
    Source: fa:16:3e:e4:d3:de (fa:16:3e:e4:d3:de)
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.1, Dst: 239.1.1.1
    0100 .... = Version: 4
    .... 0110 = Header Length: 24 bytes (6)
    Differentiated Services Field: 0xc0 (DSCP: CS6, ECN: Not-ECT)
    Total Length: 40
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 1
    Protocol: IGMP (2)
    Header Checksum: 0x7263 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.1.1
    Destination Address: 239.1.1.1
    Options: (4 bytes), Router Alert
Internet Group Management Protocol
    [IGMP Version: 3]
    Type: Membership Query (0x11)
    Max Resp Time: 2.0 sec (0x14)
    Checksum: 0xfce5 [correct]
    [Checksum Status: Good]
    Multicast Address: 239.1.1.1
    .... 0... = S: Do not suppress router side processing
    .... .000 = QRV: 0
    QQIC: 0
    Num Src: 1
    Source Address: 1.1.1.1

Membership Report

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 3
Enter the number of flows > 1

Building flow number [ 1 ]:

IGMP Version (v1/v2/v3) > v3

IGMP Message Type:

1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Query, Group-and-Source-Specific
4 -- Membership Report
5 -- Leave Group

Enter your choice (1-5) > 4
Sender MAC (de:ad:be:ef:ca:fe) > 00:25:2e:51c3:81
Sender IP > 192.168.1.6
Tag (y/n) > n
Number of group records > 1

Group record 1:
Multicast Address > 239.255.255.250

Record Type:

1 -- Mode Is Include
2 -- Mode Is Exclude
3 -- Change To Include Mode
4 -- Change To Exclude Mode
5 -- Allow New Sources
6 -- Block Old Sources

Enter your choice (1-6) > 1
Source addresses (IP1,IP2) > 1.1.1.1
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:23:14,498: INFO: IGMPv3 Membership Report
###[ Ethernet ]###
  dst       = 01:00:5e:00:00:16
  src       = 00:25:2e:51c3:81
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0xc0
     len       = None
     id        = 1
     flags     =
     frag      = 0
     ttl       = 1
     proto     = igmp
     chksum    = None
     src       = 192.168.1.6
     dst       = 224.0.0.22
     \options   \
      |###[ IP Option Router Alert ]###
      |  copy_flag = 1
      |  optclass  = control
      |  option    = router_alert
      |  length    = 4
      |  alert     = router_shall_examine_packet
###[ IGMPv3 ]###
        type      = Version 3 Membership Report
        mrcode    = 0
        chksum    = None
###[ IGMPv3mr ]###
           res2      = 0x0
           numgrp    = 1
           \records   \
            |###[ IGMPv3gr ]###
            |  rtype     = Mode Is Include
            |  auxdlen   = 0
            |  numsrc    = 1
            |  maddr     = 239.255.255.250
            |  srcaddrs  = [1.1.1.1]

2023-08-28 12:23:14,500: INFO: Sending out all flows
2023-08-28 12:23:14,546: INFO: Done sending all flows
2023-08-28 12:23:14,580: INFO: Module completed
Reveal Packet

Ethernet II, Src: 30:30:3a:32:35:3a (30:30:3a:32:35:3a), Dst: IPv4mcast_16 (01:00:5e:00:00:16)
    Destination: IPv4mcast_16 (01:00:5e:00:00:16)
    Source: 30:30:3a:32:35:3a (30:30:3a:32:35:3a)
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.6, Dst: 224.0.0.22
    0100 .... = Version: 4
    .... 0110 = Header Length: 24 bytes (6)
    Differentiated Services Field: 0xc0 (DSCP: CS6, ECN: Not-ECT)
    Total Length: 44
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 1
    Protocol: IGMP (2)
    Header Checksum: 0x8246 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.1.6
    Destination Address: 224.0.0.22
    Options: (4 bytes), Router Alert
Internet Group Management Protocol
    [IGMP Version: 3]
    Type: Membership Report (0x22)
    Reserved: 00
    Checksum: 0xeb00 [correct]
    [Checksum Status: Good]
    Reserved: 0000
    Num Group Records: 1
    Group Record : 239.255.255.250  Mode Is Include
        Record Type: Mode Is Include (1)
        Aux Data Len: 0
        Num Src: 1
        Multicast Address: 239.255.255.250
        Source Address: 1.1.1.1

Leave Group

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 3
Enter the number of flows > 1

Building flow number [ 1 ]:

IGMP Version (v1/v2/v3) > v3

IGMP Message Type:

1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Query, Group-and-Source-Specific
4 -- Membership Report
5 -- Leave Group

Enter your choice (1-5) > 5
Sender MAC (de:ad:be:ef:ca:fe) > 00:25:2e:51c3:81
Sender IP > 192.168.1.6
Tag (y/n) > n
Number of group records > 1

Group record 1:
Multicast Address > 239.1.1.1
Source addresses (IP1,IP2) > 1.1.1.1
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:26:12,015: INFO: IGMPv3 Leave Message
###[ Ethernet ]###
  dst       = 01:00:5e:00:00:16
  src       = 00:25:2e:51c3:81
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0xc0
     len       = None
     id        = 1
     flags     =
     frag      = 0
     ttl       = 1
     proto     = igmp
     chksum    = None
     src       = 192.168.1.6
     dst       = 224.0.0.22
     \options   \
      |###[ IP Option Router Alert ]###
      |  copy_flag = 1
      |  optclass  = control
      |  option    = router_alert
      |  length    = 4
      |  alert     = router_shall_examine_packet
###[ IGMPv3 ]###
        type      = Version 3 Membership Report
        mrcode    = 0
        chksum    = None
###[ IGMPv3mr ]###
           res2      = 0x0
           numgrp    = 1
           \records   \
            |###[ IGMPv3gr ]###
            |  rtype     = Block Old Sources
            |  auxdlen   = 0
            |  numsrc    = 1
            |  maddr     = 239.1.1.1
            |  srcaddrs  = [1.1.1.1]

2023-08-28 12:26:12,016: INFO: Sending out all flows
2023-08-28 12:26:12,074: INFO: Done sending all flows
2023-08-28 12:26:12,109: INFO: Module completed
Reveal Packet

Ethernet II, Src: 30:30:3a:32:35:3a (30:30:3a:32:35:3a), Dst: IPv4mcast_16 (01:00:5e:00:00:16)
    Destination: IPv4mcast_16 (01:00:5e:00:00:16)
    Source: 30:30:3a:32:35:3a (30:30:3a:32:35:3a)
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.6, Dst: 224.0.0.22
    0100 .... = Version: 4
    .... 0110 = Header Length: 24 bytes (6)
    Differentiated Services Field: 0xc0 (DSCP: CS6, ECN: Not-ECT)
    Total Length: 44
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 1
    Protocol: IGMP (2)
    Header Checksum: 0x8246 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.1.6
    Destination Address: 224.0.0.22
    Options: (4 bytes), Router Alert
Internet Group Management Protocol
    [IGMP Version: 3]
    Type: Membership Report (0x22)
    Reserved: 00
    Checksum: 0xe5f8 [correct]
    [Checksum Status: Good]
    Reserved: 0000
    Num Group Records: 1
    Group Record : 239.1.1.1  Block Old Sources
        Record Type: Block Old Sources (6)
        Aux Data Len: 0
        Num Src: 1
        Multicast Address: 239.1.1.1
        Source Address: 1.1.1.1

Multicast

Random packet generation

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 4
Enter the number of flows > 1

Building flow number [ 1 ]:

Random Multicast Packet? (y/n) > y
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:31:45,829: INFO: Multicast Packet built
###[ Ethernet ]###
  dst       = 01:00:5e:2c:58:6b
  src       = c4:ca:2b:b1:f6:39
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     =
     frag      = 0
     ttl       = 251
     proto     = udp
     chksum    = None
     src       = 172.17.46.60
     dst       = 239.172.88.107
     \options   \
###[ UDP ]###
        sport     = 54840
        dport     = 54840
        len       = None
        chksum    = None
###[ Raw ]###
           load      = '\t\\xdd*\\xa1\\xe3\\x86:ų\\xa5\\x9b~P}\\xbc\\xaa~g\x17H\\x81\\xf0\x06\\xe3\\xef4\x0e\\x91\\wt\\x92\\xdcBa+\x1f\\xf0&h\\xf3\\xb1U\\xf2\\xcee\\xc1\\xf2\\xba_\\xe6\\x8e#>\\x90\\xaee\\x9dn\\xed%\\x9f\\xaf\\x9f'

2023-08-28 12:31:45,830: INFO: Sending out all flows
2023-08-28 12:31:45,902: INFO: Done sending all flows
2023-08-28 12:31:45,935: INFO: Module completed
Reveal Packet

Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: IPv4mcast_2c:58:6b (01:00:5e:2c:58:6b)
    Destination: IPv4mcast_2c:58:6b (01:00:5e:2c:58:6b)
    Source: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 172.17.46.60, Dst: 239.172.88.107
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 92
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 251
    Protocol: UDP (17)
    Header Checksum: 0x9d2a [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 172.17.46.60
    Destination Address: 239.172.88.107
User Datagram Protocol, Src Port: 54840, Dst Port: 54840
Data (64 bytes)

Manual packet generation with VLAN Tag

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 4
Enter the number of flows > 1

Building flow number [ 1 ]:

Random Multicast Packet? (y/n) > n
Source MAC (de:ad:be:ef:ca:fe) > c4:ca:2b:b1:f6:39
Source IP > 192.168.1.6
Destination IP > 239.1.1.1
UDP Source Port > 65535
UDP Destination Port > 54840
Tag (y/n) > y
VLAN Tag (x,y) > 10
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:33:14,323: INFO: UDP Packet built
###[ Ethernet ]###
  dst       = 01:00:5e:01:01:01
  src       = c4:ca:2b:b1:f6:39
  type      = n_802_1Q
###[ 802.1Q ]###
     prio      = 0
     id        = 0
     vlan      = 10
     type      = IPv4
###[ IP ]###
        version   = 4
        ihl       = None
        tos       = 0x0
        len       = None
        id        = 1
        flags     =
        frag      = 0
        ttl       = 28
        proto     = udp
        chksum    = None
        src       = 192.168.1.6
        dst       = 239.1.1.1
        \options   \
###[ UDP ]###
           sport     = 65535
           dport     = 54840
           len       = None
           chksum    = None
###[ Raw ]###
              load      = '\\xdes\\xc3i\x0b\\x92\\xc3\x02\\x9b\\x8f\t$\\x9f\x1a-\n\\xe1Y\\xea\x16\\xbe\\xedL5\\xf0\\x96\t\\xb9\\x8da\\xfcF.\t.Y[\\xb9b\\x8a\\x9a\\xbc=\\xbe<\x0bڸ\\xaf\x19\\x90\x15\\xf0\\xb4BT\\xa8\nA\\xed\\x91\\xe5_<'

2023-08-28 12:33:14,324: INFO: Sending out all flows
2023-08-28 12:33:14,374: INFO: Done sending all flows
2023-08-28 12:33:14,407: INFO: Module completed
Reveal Packet

Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: IPv4mcast_01:01:01 (01:00:5e:01:01:01)
    Destination: IPv4mcast_01:01:01 (01:00:5e:01:01:01)
    Source: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
    Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 10
    000. .... .... .... = Priority: Best Effort (default) (0)
    ...0 .... .... .... = DEI: Ineligible
    .... 0000 0000 1010 = ID: 10
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.6, Dst: 239.1.1.1
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 92
    Identification: 0x0001 (1)
    000. .... = Flags: 0x0
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 28
    Protocol: UDP (17)
    Header Checksum: 0xecdf [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.1.6
    Destination Address: 239.1.1.1
User Datagram Protocol, Src Port: 65535, Dst Port: 54840
Data (64 bytes)

VXLAN

VXLAN Inner ICMP

Random packet generation

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 5
Enter the number of flows > 1

Building flow number [ 1 ]:

Packet Type:

1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP

Enter your choice (1-3) > 1
Generate random Vxlan ICMP Packet? (y/n) > y
ICMP Type (req/reply) > req
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:41:35,200: INFO: Inner ICMP packet built
2023-08-28 12:41:35,201: INFO: Vxlan ICMP Packet built
###[ Ethernet ]###
  dst       = 0d:30:87:12:39:ed
  src       = c4:ca:2b:b1:f6:39
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     = DF
     frag      = 0
     ttl       = 99
     proto     = udp
     chksum    = None
     src       = 192.162.13.74
     dst       = 192.162.178.122
     \options   \
###[ UDP ]###
        sport     = 54567
        dport     = 4789
        len       = None
        chksum    = None
###[ VXLAN ]###
           flags     = Instance
           reserved1 = 0
           vni       = 0xac74a6
           reserved2 = 0x0
###[ Ethernet ]###
              dst       = 86:20:71:ab:3d:b8
              src       = f2:8e:7b:69:57:61
              type      = IPv4
###[ IP ]###
                 version   = 4
                 ihl       = None
                 tos       = 0x0
                 len       = None
                 id        = 1
                 flags     =
                 frag      = 0
                 ttl       = 58
                 proto     = icmp
                 chksum    = None
                 src       = 172.29.136.163
                 dst       = 172.26.193.124
                 \options   \
###[ ICMP ]###
                    type      = echo-request
                    code      = 0
                    chksum    = None
                    id        = 0x28e
                    seq       = 0x0
                    unused    = ''
###[ Raw ]###
                       load      = '\\xb4m\x16\x11\\x83\\x90Vp7jє\\x82\\x8b8@\\xd3pۍ\\x97\\x89\\xd6G\\xb0\\xc1A\\xd2\\xf1Gy\n\\xff\\x86J(1\x14\\xcd\\xe2\\xf4\\xdcht\\x84\x00\\xda\\xea\x03\\x87\\xd4\\xe2\\xd7\x046\\xce%\\xaf95\\x9d\\x838\\xb7'

2023-08-28 12:41:35,203: INFO: Sending out all flows
2023-08-28 12:41:35,263: INFO: Done sending all flows
2023-08-28 12:41:35,299: INFO: Module completed
Reveal Packet

Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: 0d:30:87:12:39:ed (0d:30:87:12:39:ed)
Internet Protocol Version 4, Src: 192.162.13.74, Dst: 192.162.178.122
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 142
    Identification: 0x0001 (1)
    010. .... = Flags: 0x2, Don't fragment
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 99
    Protocol: UDP (17)
    Header Checksum: 0xd654 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.162.13.74
    Destination Address: 192.162.178.122
User Datagram Protocol, Src Port: 54567, Dst Port: 4789
Virtual eXtensible Local Area Network
    Flags: 0x0800, VXLAN Network ID (VNI)
    Group Policy ID: 0
    VXLAN Network Identifier (VNI): 11302054
    Reserved: 0
Ethernet II, Src: f2:8e:7b:69:57:61 (f2:8e:7b:69:57:61), Dst: 86:20:71:ab:3d:b8 (86:20:71:ab:3d:b8)
Internet Protocol Version 4, Src: 172.29.136.163, Dst: 172.26.193.124
Internet Control Message Protocol

Manual packet generation

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 5
Enter the number of flows > 1

Building flow number [ 1 ]:

Packet Type:

1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP

Enter your choice (1-3) > 1
Generate random Vxlan ICMP Packet? (y/n) > n
ICMP Type (req/reply) > req
Inner Source MAC (de:ad:be:ef:ca:fe) > 00:00:5e:00:53:65
Inner Destination MAC > 00:00:5e:00:53:66
Inner Source IP > 192.168.12.101
Inner Destination IP > 192.168.12.102
Inner TTL > 55
Outer Source MAC (de:ad:be:af:ca:fe) > 00:00:5e:00:53:11
Outer Destination MAC > 00:00:5e:00:53:22
Outer Source IP > 1.1.1.1
Outer Destination IP > 2.2.2.2
Outer UDP Source Port > 38139
Outer UDP Destination Port (default 4789) >
VNI > 1001
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:48:49,238: INFO: Inner ICMP packet built
2023-08-28 12:48:49,238: INFO: Vxlan ICMP Packet built
###[ Ethernet ]###
  dst       = 00:00:5e:00:53:22
  src       = 00:00:5e:00:53:11
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     = DF
     frag      = 0
     ttl       = 206
     proto     = udp
     chksum    = None
     src       = 1.1.1.1
     dst       = 2.2.2.2
     \options   \
###[ UDP ]###
        sport     = 38139
        dport     = 4789
        len       = None
        chksum    = None
###[ VXLAN ]###
           flags     = Instance
           reserved1 = 0
           vni       = 0x3e9
           reserved2 = 0x0
###[ Ethernet ]###
              dst       = 00:00:5e:00:53:66
              src       = 00:00:5e:00:53:65
              type      = IPv4
###[ IP ]###
                 version   = 4
                 ihl       = None
                 tos       = 0x0
                 len       = None
                 id        = 1
                 flags     =
                 frag      = 0
                 ttl       = 55
                 proto     = icmp
                 chksum    = None
                 src       = 192.168.12.101
                 dst       = 192.168.12.102
                 \options   \
###[ ICMP ]###
                    type      = echo-request
                    code      = 0
                    chksum    = None
                    id        = 0x32e
                    seq       = 0x0
                    unused    = ''
###[ Raw ]###
                       load      = 'U\\x9aVA\x0ea\x14\x06\\xdb\\xefR\x03\\xdaΦ\\xb2\\xbc\\x9c\x07Z\\xb2"\\xfdu\\xb2\\xe3\\xa1\\xebKZa0/*\'rl\\x91\\x8f^eT^5\x02\\xf9KhM\\x86S^\\xc9!\\x9c\\xab0\\xed_F\\xf4\\x94i\\x90'

2023-08-28 12:48:49,240: INFO: Sending out all flows
2023-08-28 12:48:49,286: INFO: Done sending all flows
2023-08-28 12:48:49,319: INFO: Module completed
Reveal Packet

Ethernet II, Src: ICANNIAN_00:53:11 (00:00:5e:00:53:11), Dst: ICANNIAN_00:53:22 (00:00:5e:00:53:22)
Internet Protocol Version 4, Src: 1.1.1.1, Dst: 2.2.2.2
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 142
    Identification: 0x0001 (1)
    010. .... = Flags: 0x2, Don't fragment
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 206
    Protocol: UDP (17)
    Header Checksum: 0xa658 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 1.1.1.1
    Destination Address: 2.2.2.2
User Datagram Protocol, Src Port: 38139, Dst Port: 4789
Virtual eXtensible Local Area Network
    Flags: 0x0800, VXLAN Network ID (VNI)
    Group Policy ID: 0
    VXLAN Network Identifier (VNI): 1001
    Reserved: 0
Ethernet II, Src: ICANNIAN_00:53:65 (00:00:5e:00:53:65), Dst: ICANNIAN_00:53:66 (00:00:5e:00:53:66)
Internet Protocol Version 4, Src: 192.168.12.101, Dst: 192.168.12.102
Internet Control Message Protocol

VXLAN Inner UDP

Random packet generation

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 5
Enter the number of flows > 1

Building flow number [ 1 ]:

Packet Type:

1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP

Enter your choice (1-3) > 2
Generate random Vxlan UDP Packet? (y/n) > y
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:54:46,123: INFO: Inner UDP packet built
2023-08-28 12:54:46,124: INFO: Vxlan UDP Packet built
###[ Ethernet ]###
  dst       = d4:4b:03:f3:1a:10
  src       = c4:ca:2b:b1:f6:39
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     = DF
     frag      = 0
     ttl       = 99
     proto     = udp
     chksum    = None
     src       = 192.167.64.242
     dst       = 192.163.191.98
     \options   \
###[ UDP ]###
        sport     = 49736
        dport     = 4789
        len       = None
        chksum    = None
###[ VXLAN ]###
           flags     = Instance
           reserved1 = 0
           vni       = 0xfc0c15
           reserved2 = 0x0
###[ Ethernet ]###
              dst       = 7a:e7:3a:cc:28:36
              src       = 46:22:d7:f9:f5:90
              type      = IPv4
###[ IP ]###
                 version   = 4
                 ihl       = None
                 tos       = 0x0
                 len       = None
                 id        = 1
                 flags     =
                 frag      = 0
                 ttl       = 86
                 proto     = udp
                 chksum    = None
                 src       = 172.22.41.69
                 dst       = 172.24.26.69
                 \options   \
###[ UDP ]###
                    sport     = 49741
                    dport     = 49741
                    len       = None
                    chksum    = None
###[ Raw ]###
                       load      = "QZZ\\xd6ޭ.\\x8b\\xca\\xe5VC\\x99\x12'\\xdd\x0475:\\xf1P\\x95\\xd2Tb\\xf3Is4\r\\xbe\\x99\\x84\\xb9\\xbf2\\xa8\\xdf\\xee\\xfb\\xd4\\xf5b\x0e\\x97p\\xcb\n\\xa3\\x80]\x08\\xba\\x9df徱?&\\\x1d3"

2023-08-28 12:54:46,125: INFO: Sending out all flows
2023-08-28 12:54:46,182: INFO: Done sending all flows
2023-08-28 12:54:46,215: INFO: Module completed
Reveal Packet

Frame 122: 156 bytes on wire (1248 bits), 156 bytes captured (1248 bits) on interface -, id 0
Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: d4:4b:03:f3:1a:10 (d4:4b:03:f3:1a:10)
Internet Protocol Version 4, Src: 192.167.64.242, Dst: 192.163.191.98
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 142
    Identification: 0x0001 (1)
    010. .... = Flags: 0x2, Don't fragment
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 99
    Protocol: UDP (17)
    Header Checksum: 0x95be [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.167.64.242
    Destination Address: 192.163.191.98
User Datagram Protocol, Src Port: 49736, Dst Port: 4789
Virtual eXtensible Local Area Network
    Flags: 0x0800, VXLAN Network ID (VNI)
    Group Policy ID: 0
    VXLAN Network Identifier (VNI): 16518165
    Reserved: 0
Ethernet II, Src: 46:22:d7:f9:f5:90 (46:22:d7:f9:f5:90), Dst: 7a:e7:3a:cc:28:36 (7a:e7:3a:cc:28:36)
Internet Protocol Version 4, Src: 172.22.41.69, Dst: 172.24.26.69
User Datagram Protocol, Src Port: 49741, Dst Port: 49741
Data (64 bytes)

Manual packet generation

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 5
Enter the number of flows > 1

Building flow number [ 1 ]:

Packet Type:

1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP

Enter your choice (1-3) > 2
Generate random Vxlan UDP Packet? (y/n) > n
Inner Source MAC (de:ad:be:ef:ca:fe) > ba:ad:be:ef:ca:Fe
Inner Destination MAC > de:ad:be:ef:ca:fe
Inner Source IP > 192.168.15.10
Inner Destination IP > 192.168.15.20
Inner UDP Source Port > 65535
Inner UDP Destination Port > 8008
Outer Source MAC (de:ad:be:af:ca:fe) > e4:3e:92:43:19:23
Outer Destination MAC > c4:ca:2b:b1:f6:39
Outer Source IP > 4.4.4.4
Outer Destination IP > 5.5.5.5
Outer UDP Source Port > 38139
Outer UDP Destination Port (default 4789) >
VNI > 10020
Count (c for continous) > 5
Source Interface > et48
2023-08-28 13:10:47,597: INFO: Inner UDP packet built
2023-08-28 13:10:47,597: INFO: Vxlan UDP Packet built
###[ Ethernet ]###
  dst       = c4:ca:2b:b1:f6:39
  src       = e4:3e:92:43:19:23
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     = DF
     frag      = 0
     ttl       = 154
     proto     = udp
     chksum    = None
     src       = 4.4.4.4
     dst       = 5.5.5.5
     \options   \
###[ UDP ]###
        sport     = 38139
        dport     = 4789
        len       = None
        chksum    = None
###[ VXLAN ]###
           flags     = Instance
           reserved1 = 0
           vni       = 0x2724
           reserved2 = 0x0
###[ Ethernet ]###
              dst       = de:ad:be:ef:ca:fe
              src       = ba:ad:be:ef:ca:Fe
              type      = IPv4
###[ IP ]###
                 version   = 4
                 ihl       = None
                 tos       = 0x0
                 len       = None
                 id        = 1
                 flags     =
                 frag      = 0
                 ttl       = 143
                 proto     = udp
                 chksum    = None
                 src       = 192.168.15.10
                 dst       = 192.168.15.20
                 \options   \
###[ UDP ]###
                    sport     = 65535
                    dport     = 8008
                    len       = None
                    chksum    = None
###[ Raw ]###
                       load      = '\\xa2IO\x1c\x0c\\xd1G\x06u|f7I\\xacX\\xf3+\x1e\\xbf\\x80V\\x9e\\xa7\\x97\\x95\\xac\\xfb\\x8a\\xaa\\x80\x1d\\x8f\\xc9T\rM\\xc0\\x8e\\xb1\\x90\\xf6А߬\\xa8 ]\\xad8@\\xcdܱ\\xfc\\x80\\xe3\\xe2\\xa0\\xf1A\\xde\x1e\\xb1'

2023-08-28 13:10:47,599: INFO: Sending out all flows
2023-08-28 13:10:47,642: INFO: Done sending all flows
2023-08-28 13:10:47,676: INFO: Module completed
Reveal Packet

Ethernet II, Src: e4:3e:92:43:19:23 (e4:3e:92:43:19:23), Dst: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
Internet Protocol Version 4, Src: 4.4.4.4, Dst: 5.5.5.5
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 142
    Identification: 0x0001 (1)
    010. .... = Flags: 0x2, Don't fragment
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 154
    Protocol: UDP (17)
    Header Checksum: 0xce4c [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 4.4.4.4
    Destination Address: 5.5.5.5
User Datagram Protocol, Src Port: 38139, Dst Port: 4789
Virtual eXtensible Local Area Network
    Flags: 0x0800, VXLAN Network ID (VNI)
    Group Policy ID: 0
    VXLAN Network Identifier (VNI): 10020
    Reserved: 0
Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: de:ad:be:ef:ca:fe (de:ad:be:ef:ca:fe)
Internet Protocol Version 4, Src: 192.168.15.10, Dst: 192.168.15.20
User Datagram Protocol, Src Port: 65535, Dst Port: 8008
Data (64 bytes)

VXLAN Inner TCP

Random packet generation

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 5
Enter the number of flows > 1

Building flow number [ 1 ]:

Packet Type:

1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP

Enter your choice (1-3) > 3
Generate random Vxlan TCP Packet? (y/n) > y
Count (c for continous) > 5
Source Interface > et48
2023-08-28 13:14:54,968: INFO: Inner TCP packet built
2023-08-28 13:14:54,968: INFO: Vxlan TCP Packet built
###[ Ethernet ]###
  dst       = 64:d3:32:7c:f0:95
  src       = c4:ca:2b:b1:f6:39
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     = DF
     frag      = 0
     ttl       = 86
     proto     = udp
     chksum    = None
     src       = 192.173.127.171
     dst       = 192.161.190.8
     \options   \
###[ UDP ]###
        sport     = 54702
        dport     = 4789
        len       = None
        chksum    = None
###[ VXLAN ]###
           flags     = Instance
           reserved1 = 0
           vni       = 0xdd07ee
           reserved2 = 0x0
###[ Ethernet ]###
              dst       = 84:f9:0a:e5:84:2e
              src       = 53:89:a9:c0:82:92
              type      = IPv4
###[ IP ]###
                 version   = 4
                 ihl       = None
                 tos       = 0x0
                 len       = None
                 id        = 1
                 flags     =
                 frag      = 0
                 ttl       = 81
                 proto     = tcp
                 chksum    = None
                 src       = 172.31.28.152
                 dst       = 172.30.88.163
                 \options   \
###[ TCP ]###
                    sport     = 63779
                    dport     = <RandShort>
                    seq       = 0
                    ack       = 0
                    dataofs   = None
                    reserved  = 0
                    flags     = S
                    window    = 8192
                    chksum    = None
                    urgptr    = 0
                    options   = ''

2023-08-28 13:14:54,970: INFO: Sending out all flows
2023-08-28 13:14:55,034: INFO: Done sending all flows
2023-08-28 13:14:55,067: INFO: Module completed
Reveal Packet

Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: 64:d3:32:7c:f0:95 (64:d3:32:7c:f0:95)
Internet Protocol Version 4, Src: 192.173.127.171, Dst: 192.161.190.8
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 90
    Identification: 0x0001 (1)
    010. .... = Flags: 0x2, Don't fragment
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 86
    Protocol: UDP (17)
    Header Checksum: 0x658f [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.173.127.171
    Destination Address: 192.161.190.8
User Datagram Protocol, Src Port: 54702, Dst Port: 4789
Virtual eXtensible Local Area Network
    Flags: 0x0800, VXLAN Network ID (VNI)
    Group Policy ID: 0
    VXLAN Network Identifier (VNI): 14485486
    Reserved: 0
Ethernet II, Src: 53:89:a9:c0:82:92 (53:89:a9:c0:82:92), Dst: 84:f9:0a:e5:84:2e (84:f9:0a:e5:84:2e)
Internet Protocol Version 4, Src: 172.31.28.152, Dst: 172.30.88.163
Transmission Control Protocol, Src Port: 63779, Dst Port: 9808, Seq: 0, Len: 0

Manual packet generation

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 5
Enter the number of flows > 1

Building flow number [ 1 ]:

Packet Type:

1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP

Enter your choice (1-3) > 3
Generate random Vxlan TCP Packet? (y/n) > n
Inner Source MAC (de:ad:be:ef:ca:fe) > ba:ad:be:ef:ca:fe
Inner Destination MAC > de:ad:be:ef:ca:fe
Inner Source IP > 192.168.11.1
Inner Destination IP > 192.168.11.2
Inner TCP Source Port > 54838
Inner TCP Destination Port > 80
Outer Source MAC (de:ad:be:af:ca:fe) > c4:ca:2b:b1:f6:39
Outer Destination MAC > 31:05:92:3e:ff:a2
Outer Source IP > 1.1.1.1
Outer Destination IP > 2.2.2.2
Outer UDP Source Port > 63258
Outer UDP Destination Port (default 4789) >
VNI > 2002
Count (c for continous) > 5
Source Interface > et48
2023-08-28 13:18:47,801: INFO: Inner TCP packet built
2023-08-28 13:18:47,801: INFO: Vxlan TCP Packet built
###[ Ethernet ]###
  dst       = 31:05:92:3e:ff:a2
  src       = c4:ca:2b:b1:f6:39
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     = DF
     frag      = 0
     ttl       = 145
     proto     = udp
     chksum    = None
     src       = 1.1.1.1
     dst       = 2.2.2.2
     \options   \
###[ UDP ]###
        sport     = 63258
        dport     = 4789
        len       = None
        chksum    = None
###[ VXLAN ]###
           flags     = Instance
           reserved1 = 0
           vni       = 0x7d2
           reserved2 = 0x0
###[ Ethernet ]###
              dst       = de:ad:be:ef:ca:fe
              src       = ba:ad:Be:ef:ca:fe
              type      = IPv4
###[ IP ]###
                 version   = 4
                 ihl       = None
                 tos       = 0x0
                 len       = None
                 id        = 1
                 flags     =
                 frag      = 0
                 ttl       = 169
                 proto     = tcp
                 chksum    = None
                 src       = 192.168.11.1
                 dst       = 192.168.11.2
                 \options   \
###[ TCP ]###
                    sport     = 54838
                    dport     = http
                    seq       = 0
                    ack       = 0
                    dataofs   = None
                    reserved  = 0
                    flags     = S
                    window    = 8192
                    chksum    = None
                    urgptr    = 0
                    options   = ''

2023-08-28 13:18:47,803: INFO: Sending out all flows
2023-08-28 13:18:47,854: INFO: Done sending all flows
2023-08-28 13:18:47,889: INFO: Module completed
Reveal Packet

Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: 31:05:92:3e:ff:a2 (31:05:92:3e:ff:a2)
Internet Protocol Version 4, Src: 1.1.1.1, Dst: 2.2.2.2
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 90
    Identification: 0x0001 (1)
    010. .... = Flags: 0x2, Don't fragment
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 145
    Protocol: UDP (17)
    Header Checksum: 0xe38c [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 1.1.1.1
    Destination Address: 2.2.2.2
User Datagram Protocol, Src Port: 63258, Dst Port: 4789
Virtual eXtensible Local Area Network
    Flags: 0x0800, VXLAN Network ID (VNI)
    Group Policy ID: 0
    VXLAN Network Identifier (VNI): 2002
    Reserved: 0
Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: de:ad:be:ef:ca:fe (de:ad:be:ef:ca:fe)
Internet Protocol Version 4, Src: 192.168.11.1, Dst: 192.168.11.2
Transmission Control Protocol, Src Port: 54838, Dst Port: 80, Seq: 0, Len: 0

VXLAN Inner ARP

Random packet generation

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 5
Enter the number of flows > 1

Building flow number [ 1 ]:

Packet Type:

1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP

Enter your choice (1-3) > 4
Generate random Vxlan ARP Packet? (y/n) > y
ARP Type (req/resp) > req
Count (c for continous) > 5
Source Interface > et48
2023-08-28 13:23:17,719: INFO: Inner ARP packet built
2023-08-28 13:23:17,720: INFO: VXLAN ARP packet built
###[ Ethernet ]###
  dst       = 68:ef:7c:2d:0c:be
  src       = c4:ca:2b:b1:f6:39
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     = DF
     frag      = 0
     ttl       = 186
     proto     = udp
     chksum    = None
     src       = 192.174.57.89
     dst       = 192.172.16.51
     \options   \
###[ UDP ]###
        sport     = 51906
        dport     = 4789
        len       = None
        chksum    = None
###[ VXLAN ]###
           flags     = Instance
           reserved1 = 0
           vni       = 0xd6709
           reserved2 = 0x0
###[ Ethernet ]###
              dst       = ff:ff:ff:ff:ff:ff
              src       = dd:e6:65:66:df:0c
              type      = ARP
###[ ARP ]###
                 hwtype    = Ethernet (10Mb)
                 ptype     = IPv4
                 hwlen     = None
                 plen      = None
                 op        = who-has
                 hwsrc     = dd:e6:65:66:df:0c
                 psrc      = 172.20.96.38
                 hwdst     = 00:00:00:00:00:00
                 pdst      = 172.20.209.178

2023-08-28 13:23:17,721: INFO: Sending out all flows
2023-08-28 13:23:17,806: INFO: Done sending all flows
2023-08-28 13:23:17,839: INFO: Module completed
Reveal Packet

Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: 68:ef:7c:2d:0c:be (68:ef:7c:2d:0c:be)
Internet Protocol Version 4, Src: 192.174.57.89, Dst: 192.172.16.51
User Datagram Protocol, Src Port: 51906, Dst Port: 4789
Virtual eXtensible Local Area Network
    Flags: 0x0800, VXLAN Network ID (VNI)
    Group Policy ID: 0
    VXLAN Network Identifier (VNI): 878345
    Reserved: 0
Ethernet II, Src: dd:e6:65:66:df:0c (dd:e6:65:66:df:0c), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Address Resolution Protocol (request)
    Hardware type: Ethernet (1)
    Protocol type: IPv4 (0x0800)
    Hardware size: 6
    Protocol size: 4
    Opcode: request (1)
    Sender MAC address: dd:e6:65:66:df:0c (dd:e6:65:66:df:0c)
    Sender IP address: 172.20.96.38
    Target MAC address: 00:00:00_00:00:00 (00:00:00:00:00:00)
    Target IP address: 172.20.209.178

Manual packet generation

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 5
Enter the number of flows > 1

Building flow number [ 1 ]:

Packet Type:

1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP

Enter your choice (1-3) > 4
Generate random Vxlan ARP Packet? (y/n) > n
ARP Type (req/resp) > resp
Inner Source MAC (de:ad:be:ef:ca:fe) > fa:16:3e:8c:59:a3
Inner Destination MAC > fa:16:3e:38:94:9d
Inner Sender MAC > fa:16:3e:8c:59:a3
Inner Sender IP > 192.168.12.2
Inner Target MAC > fa:16:3e:38:94:9d
Inner Target IP > 192.168.12.3
Outer Source MAC (de:ad:be:af:ca:fe) > ba:ad:be:ef:ca:fe
Outer Destination MAC > de:ad:be:ef:ca:fe
Outer Source IP > 1.1.1.1
Outer Destination IP > 2.2.2.2
Outer UDP Source Port > 51906
Outer UDP Destination Port (default 4789) >
VNI > 1010
Count (c for continous) > 5
Source Interface > et48
2023-08-28 13:27:35,150: INFO: Inner ARP packet built
2023-08-28 13:27:35,150: INFO: Vxlan ARP Packet built
###[ Ethernet ]###
  dst       = de:ad:be:ef:ca:fe
  src       = ba:ad:be:ef:ca:fe
  type      = IPv4
###[ IP ]###
     version   = 4
     ihl       = None
     tos       = 0x0
     len       = None
     id        = 1
     flags     = DF
     frag      = 0
     ttl       = 55
     proto     = udp
     chksum    = None
     src       = 1.1.1.1
     dst       = 2.2.2.2
     \options   \
###[ UDP ]###
        sport     = 51906
        dport     = 4789
        len       = None
        chksum    = None
###[ VXLAN ]###
           flags     = Instance
           reserved1 = 0
           vni       = 0x3f2
           reserved2 = 0x0
###[ Ethernet ]###
              dst       = fa:16:3e:38:94:9d
              src       = fa:16:3e:8c:59:a3
              type      = ARP
###[ ARP ]###
                 hwtype    = Ethernet (10Mb)
                 ptype     = IPv4
                 hwlen     = None
                 plen      = None
                 op        = is-at
                 hwsrc     = fa:16:3e:8c:59:a3
                 psrc      = 192.168.12.2
                 hwdst     = fa:16:3e:38:94:9d
                 pdst      = 192.168.12.3

2023-08-28 13:27:35,151: INFO: Sending out all flows
2023-08-28 13:27:35,202: INFO: Done sending all flows
2023-08-28 13:27:35,234: INFO: Module completed
Reveal Packet

Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: de:ad:be:ef:ca:fe (de:ad:be:ef:ca:fe)
Internet Protocol Version 4, Src: 1.1.1.1, Dst: 2.2.2.2
User Datagram Protocol, Src Port: 51906, Dst Port: 4789
Virtual eXtensible Local Area Network
    Flags: 0x0800, VXLAN Network ID (VNI)
    Group Policy ID: 0
    VXLAN Network Identifier (VNI): 1010
    Reserved: 0
Ethernet II, Src: fa:16:3e:8c:59:a3 (fa:16:3e:8c:59:a3), Dst: fa:16:3e:38:94:9d (fa:16:3e:38:94:9d)
Address Resolution Protocol (reply)
    Hardware type: Ethernet (1)
    Protocol type: IPv4 (0x0800)
    Hardware size: 6
    Protocol size: 4
    Opcode: reply (2)
    Sender MAC address: fa:16:3e:8c:59:a3 (fa:16:3e:8c:59:a3)
    Sender IP address: 192.168.12.2
    Target MAC address: fa:16:3e:38:94:9d (fa:16:3e:38:94:9d)
    Target IP address: 192.168.12.3

Load PCAP File

This module allows users to load packets from a packet capture file on disk and then edit and replay those packets from an interface.

Provide the abosolute path to the capture file being loaded.

Currently this module supports only basic fields which can be modified:

  • Source & Destination MAC
  • Source & Destination IP

Edit and replay - Specific IP Flows

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 6
Path to pcap file > /mnt/flash/test-trace.pcap
2023-08-28 13:37:01,057: INFO: Pcap file loaded successfully!

Select action:

1 -- Edit and replay all packets
2 -- Edit and replay specific IP flows
3 -- Edit and replay specific non-IP flows
4 -- Replay the same pcap

Enter your choice (1-4) > 2
2023-08-28 13:37:10,170: INFO: Following unique flows found in capture...
|  Index  | Source       | Destination   |  Packet Count  |
|---------|--------------|---------------|----------------|
|    1    | 172.168.5.71 | 172.168.5.48  |       34       |
|    2    | 172.168.5.48 | 172.168.5.71  |       34       |

Select flows to modify and replay (all to modify all IP flows) > 1

Modify flow [  ('172.168.5.71', '172.168.5.48')  ]

Source MAC (de:ad:be:ef:ca:fe) > ba:ad:be:ef:ca:fe
Destination MAC > de:ad:be:ef:ca:fe
Source IP > 192.168.14.1
Destination IP > 192.168.14.2
Count (c for continous) > 1
Source Interface > et48
2023-08-28 13:37:57,153: INFO: Packets after change...
0000 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0001 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0002 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0003 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0004 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0005 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0006 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0007 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0008 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0009 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0010 Ether / IP / TCP 192.168.14.1:http > 192.168.14.2:49946 SA
0011 Ether / IP / TCP 192.168.14.1:http > 192.168.14.2:49946 FA
0012 Ether / IP / TCP 192.168.14.1:https > 192.168.14.2:45152 SA
0013 Ether / IP / TCP 192.168.14.1:https > 192.168.14.2:45152 FA
0014 Ether / IP / TCP 192.168.14.1:55072 > 192.168.14.2:http PA / Raw
0015 Ether / IP / TCP 192.168.14.1:55072 > 192.168.14.2:http A
0016 Ether / IP / TCP 192.168.14.1:55072 > 192.168.14.2:http A
0017 Ether / IP / TCP 192.168.14.1:55072 > 192.168.14.2:http A
0018 Ether / IP / TCP 192.168.14.1:55072 > 192.168.14.2:http FA
0019 Ether / IP / TCP 192.168.14.1:55072 > 192.168.14.2:http A
0020 Ether / IP / TCP 192.168.14.1:39668 > 192.168.14.2:https S
0021 Ether / IP / TCP 192.168.14.1:39668 > 192.168.14.2:https A
0022 Ether / IP / TCP 192.168.14.1:39668 > 192.168.14.2:https PA / Raw
0023 Ether / IP / TCP 192.168.14.1:39668 > 192.168.14.2:https A
0024 Ether / IP / TCP 192.168.14.1:39668 > 192.168.14.2:https PA / Raw
0025 Ether / IP / TCP 192.168.14.1:39668 > 192.168.14.2:https A
0026 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https S
0027 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https A
0028 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https PA / Raw
0029 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https A
0030 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https PA / Raw
0031 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https PA / Raw
0032 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https A
0033 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https A
2023-08-28 13:37:57,159: INFO: Sending out modified flows...
2023-08-28 13:37:57,230: INFO: Done sending all flows
2023-08-28 13:37:57,231: INFO: Done with PCAP module
2023-08-28 13:37:57,265: INFO: Module completed
Reveal Packet

Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: de:ad:be:ef:ca:fe (de:ad:be:ef:ca:fe)
Internet Protocol Version 4, Src: 192.168.14.1, Dst: 192.168.14.2
Internet Control Message Protocol

Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: de:ad:be:ef:ca:fe (de:ad:be:ef:ca:fe)
Internet Protocol Version 4, Src: 192.168.14.1, Dst: 192.168.14.2
Transmission Control Protocol, Src Port: 80, Dst Port: 49946, Seq: 0, Ack: 1, Len: 0

<--snipped-->

Class of Service (CoS) marking

Following modules support adding single or multiple 802.1Q (Dot1q) VLAN tags:

  • ICMP
  • ARP
  • IGMP
  • Multicast

All these modules also support Class of Service (CoS or COS) marking per VLAN. The field specifies a priority value between 0 and 7, more commonly known as CS0 through CS7.

Users can provide the CoS value per VLAN.

The default CoS value is 0 if no user input is provided.

ICMP - Single VLAN tag with default CoS

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 1
Enter the number of flows > 1

Building flow number [ 1 ]:

Random ICMP Packet? (y/n) > n
ICMP Type (req/reply) > reply
Source MAC (de:ad:be:ef:ca:fe) > 00:1c:58:23:64:c1
Destination MAC > 00:15:62:64:33:41
Source IP > 192.168.14.10
Destination IP > 192.168.14.20
TTL > 10
Tag (y/n) > y
VLAN Tag (x,y) > 10
CoS (x,y | default 0) >
Count (c for continous) > 5
Source Interface > et48
2023-09-05 10:53:00,832: INFO: ICMP Packet built
###[ Ethernet ]###
  dst       = 00:15:62:64:33:41
  src       = 00:1c:58:23:64:c1
  type      = n_802_1Q
###[ 802.1Q ]###
     prio      = 0
     id        = 0
     vlan      = 10
     type      = IPv4
###[ IP ]###
        version   = 4
        ihl       = None
        tos       = 0x0
        len       = None
        id        = 1
        flags     =
        frag      = 0
        ttl       = 10
        proto     = icmp
        chksum    = None
        src       = 192.168.14.10
        dst       = 192.168.14.20
        \options   \
###[ ICMP ]###
           type      = echo-reply
           code      = 0
           chksum    = None
           id        = 0x294
           seq       = 0x0
           unused    = ''
###[ Raw ]###
              load      = '  \\x81ll\\xa6\\xe5\x15\\xc0\\xe6c\\xa2\\xa4K\\xb4\\xacWm\\x85$\\xaaV\\xfe\x190K\\xb7ߺ\\xf5\x16\x10\\xab\\xf9\\x94\\x84<\\x9c9\\xacm6\\xd0p\x10\\Q\x18\\xd7q̨\\xf9}\\xb4i\x02\\xb3\x19\\xf8S\\xdfjS'

2023-09-05 10:53:00,833: INFO: Sending out all flows
2023-09-05 10:53:00,886: INFO: Done sending all flows
2023-09-05 10:53:00,920: INFO: Module completed
Reveal Packet

Ethernet II, Src: Cisco_23:64:c1 (00:1c:58:23:64:c1), Dst: Cisco_64:33:41 (00:15:62:64:33:41)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 10
    000. .... .... .... = Priority: Best Effort (default) (0)
    ...0 .... .... .... = DEI: Ineligible
    .... 0000 0000 1010 = ID: 10
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.14.10, Dst: 192.168.14.20
Internet Control Message Protocol

ICMP - Double VLAN tag with default CoS

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 1
Enter the number of flows > 1

Building flow number [ 1 ]:

Random ICMP Packet? (y/n) > n
ICMP Type (req/reply) > reply
Source MAC (de:ad:be:ef:ca:fe) > 00:1c:58:23:64:c1
Destination MAC > 00:15:62:64:33:41
Source IP > 192.168.14.10
Destination IP > 192.168.14.20
TTL > 10
Tag (y/n) > y
VLAN Tag (x,y) > 10,20
CoS (x,y | default 0) >
Count (c for continous) > 5
Source Interface > et48
2023-09-05 11:03:43,324: INFO: ICMP Packet built
###[ Ethernet ]###
  dst       = 00:15:62:64:33:41
  src       = 00:1c:58:23:64:c1
  type      = n_802_1Q
###[ 802.1Q ]###
     prio      = 0
     id        = 0
     vlan      = 10
     type      = n_802_1Q
###[ 802.1Q ]###
        prio      = 0
        id        = 0
        vlan      = 20
        type      = IPv4
###[ IP ]###
           version   = 4
           ihl       = None
           tos       = 0x0
           len       = None
           id        = 1
           flags     =
           frag      = 0
           ttl       = 10
           proto     = icmp
           chksum    = None
           src       = 192.168.14.10
           dst       = 192.168.14.20
           \options   \
###[ ICMP ]###
              type      = echo-reply
              code      = 0
              chksum    = None
              id        = 0x580
              seq       = 0x0
              unused    = ''
###[ Raw ]###
                 load      = '#\\xda\x03\\xe1h\\x99\\xecj\\xed\x0b\\xa0D\\xf4\\xc7W唨\\x86\x15\x1b\\xae\x12\\xa2L~\\xe1\\xb5p\\xe8\\xa5L3\\xc0d\\xe0\x11\\xbc?\\xaaH\x10\\xf2K\\xbc\x11\x06\\xf1\\x99\\xa5[\\xbe\x01\x17Q\\xab(,\\xc4n\\xeb\\xe1\\xa2\\xf0'

2023-09-05 11:03:43,326: INFO: Sending out all flows
2023-09-05 11:03:43,382: INFO: Done sending all flows
2023-09-05 11:03:43,415: INFO: Module completed
Reveal Packet

Ethernet II, Src: Cisco_23:64:c1 (00:1c:58:23:64:c1), Dst: Cisco_64:33:41 (00:15:62:64:33:41)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 10
    000. .... .... .... = Priority: Best Effort (default) (0)
    ...0 .... .... .... = DEI: Ineligible
    .... 0000 0000 1010 = ID: 10
    Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 20
    000. .... .... .... = Priority: Best Effort (default) (0)
    ...0 .... .... .... = DEI: Ineligible
    .... 0000 0001 0100 = ID: 20
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.14.10, Dst: 192.168.14.20
Internet Control Message Protocol

ICMP - Double VLAN tag with User defined CoS

Reveal Output

==================================================
Scapy based packet generator
==================================================

1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit

Enter your choice (1-7): 1
Enter the number of flows > 1

Building flow number [ 1 ]:

Random ICMP Packet? (y/n) > n
ICMP Type (req/reply) > reply
Source MAC (de:ad:be:ef:ca:fe) > 00:1c:58:23:64:c1
Destination MAC > 00:15:62:64:33:41
Source IP > 192.168.14.10
Destination IP > 192.168.14.20
TTL > 20
Tag (y/n) > y
VLAN Tag (x,y) > 20,30
CoS (x,y | default 0) > 5,6
Count (c for continous) > 5
Source Interface > et48
2023-09-05 11:07:20,219: INFO: ICMP Packet built
###[ Ethernet ]###
  dst       = 00:15:62:64:33:41
  src       = 00:1c:58:23:64:c1
  type      = n_802_1Q
###[ 802.1Q ]###
     prio      = 5
     id        = 0
     vlan      = 20
     type      = n_802_1Q
###[ 802.1Q ]###
        prio      = 6
        id        = 0
        vlan      = 30
        type      = IPv4
###[ IP ]###
           version   = 4
           ihl       = None
           tos       = 0x0
           len       = None
           id        = 1
           flags     =
           frag      = 0
           ttl       = 20
           proto     = icmp
           chksum    = None
           src       = 192.168.14.10
           dst       = 192.168.14.20
           \options   \
###[ ICMP ]###
              type      = echo-reply
              code      = 0
              chksum    = None
              id        = 0x1f7
              seq       = 0x0
              unused    = ''
###[ Raw ]###
                 load      = 'ѷ\x15\\xf0\x16>0xyks\\xf0\x167\\xdd9\x0c\\xb2\\xf9*\x04\\xd3q\\xaf6#\\xf9L\\xad\\xbda\x0e&1\x1f?\\x9a\x01\x13"\x7f\\x88\x08S\x05\\xf98\\xd0c\n@i|}\\xc1\\xa5\\xb9\\xcbp\\xbd\x04\\xc4\\xec\\xa7'

2023-09-05 11:07:20,221: INFO: Sending out all flows
2023-09-05 11:07:20,286: INFO: Done sending all flows
2023-09-05 11:07:20,321: INFO: Module completed
Reveal Packet

Ethernet II, Src: Cisco_23:64:c1 (00:1c:58:23:64:c1), Dst: Cisco_64:33:41 (00:15:62:64:33:41)
802.1Q Virtual LAN, PRI: 5, DEI: 0, ID: 20
    101. .... .... .... = Priority: Voice, < 10ms latency and jitter (5)
    ...0 .... .... .... = DEI: Ineligible
    .... 0000 0001 0100 = ID: 20
    Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 6, DEI: 0, ID: 30
    110. .... .... .... = Priority: Internetwork Control (6)
    ...0 .... .... .... = DEI: Ineligible
    .... 0000 0001 1110 = ID: 30
    Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.14.10, Dst: 192.168.14.20
Internet Control Message Protocol