-
Notifications
You must be signed in to change notification settings - Fork 4
Examples
Below is the workflow to get started on using a module and the respective sub-modules.
To invoke a module from the primary menu, use the index numbers denoted next to the module name.
$ sudo python3 byteosaurus_hex.py
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Pause Frame
7 -- Priority Flow Control
8 -- Load PCAP File
9 -- Exit
Enter your choice (1-9):
For example to invoke the VXLAN module
- Press
5
then hitEnter
- Provide the number of flows you want to build, minimum 1 flow is required.
- For each flow you will have the option to select the:
- Number / count of packets to send
- Egress / Outgoing interface from which the packets will be sent.
- For each flow you will have the option to select the:
- Select the sub-module from the menu option.
$ sudo python3 byteosaurus_hex.py
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Pause Frame
7 -- Priority Flow Control
8 -- Load PCAP File
9 -- Exit
Enter your choice (1-9): 5
Enter the number of flows > 1
Building flow number [ 1 ]:
Packet Type:
1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP
Enter your choice (1-3) > 1
Generate random Vxlan ICMP Packet? (y/n) > y
ICMP Type (req/reply) > req
Count (c for continous) > 5
Source Interface > et4
For detailed examples per module, please refer to the module specific documentation.
The ICMP module allows users to generate following ICMP packets:
- ICMP Echo Request
- ICMP Echo Response
This module supports:
- Multiple flows
- Packet count & Outgoing interface per flow
- Random automated packet generation
- Full manual packet generation
- Adding VLAN tags
Random packet generation
Reveal Output
$ sudo python3 byteosaurus_hex.py
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 1
Enter the number of flows > 1
Building flow number [ 1 ]:
Random ICMP Packet? (y/n) > y
ICMP Type (req/reply) > req
Count (c for continous) > 5
Source Interface > et48
2023-08-27 09:24:03,984: INFO: ICMP packet built
###[ Ethernet ]###
dst = e1:5e:04:ef:37:6f
src = c4:ca:2b:b1:f6:39
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 162
proto = icmp
chksum = None
src = 172.17.229.151
dst = 172.29.92.217
\options \
###[ ICMP ]###
type = echo-request
code = 0
chksum = None
id = 0x5ff
seq = 0x0
unused = ''
###[ Raw ]###
load = 'Ȭ8Ԃ\\xd3~\x1dυ\\xfb\\xbfǜ\\xd7H\\x8c\\xeb\\xd8,\\x87\\x90R\\xbbfLj5k\\xe1\\xbe}\\xd6/aa\\xc7\\xfd>U7\\xeaT\\x92_\\xb5l\\x9c\\xaem\\xd9\\xeb\\xf7\\xe7lv5\\x8f\\xebؕ 2_'
2023-08-27 09:24:03,985: INFO: Sending out all flows
2023-08-27 09:24:04,030: INFO: Done sending all flows
2023-08-27 09:24:04,063: INFO: Module completed
Reveal Packet
Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: e1:5e:04:ef:37:6f (e1:5e:04:ef:37:6f)
Destination: e1:5e:04:ef:37:6f (e1:5e:04:ef:37:6f)
Source: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 172.17.229.151, Dst: 172.29.92.217
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 92
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 162
Protocol: ICMP (1)
Header Checksum: 0x7e00 [validation disabled]
[Header checksum status: Unverified]
Source Address: 172.17.229.151
Destination Address: 172.29.92.217
Internet Control Message Protocol
Type: 8 (Echo (ping) request)
Code: 0
Checksum: 0xdecb [correct]
[Checksum Status: Good]
Identifier (BE): 1535 (0x05ff)
Identifier (LE): 65285 (0xff05)
Sequence Number (BE): 0 (0x0000)
Sequence Number (LE): 0 (0x0000)
[No response seen]
Data (64 bytes)
Manual packet generation with VLAN Tag
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 1
Enter the number of flows > 1
Building flow number [ 1 ]:
Random ICMP Packet? (y/n) > n
ICMP Type (req/reply) > reply
Source MAC (de:ad:be:ef:ca:fe) > 00:1c:58:23:64:c1
Destination MAC > 00:15:62:64:33:41
Source IP > 192.168.14.10
Destination IP > 192.168.14.20
TTL > 10
Tag (y/n) > y
VLAN Tag (x,y) > 1,20
Count (c for continous) > 5
Source Interface > et48
2023-08-27 09:49:54,678: INFO: ICMP Packet built
###[ Ethernet ]###
dst = 00:15:62:64:33:41
src = 00:1c:58:23:64:c1
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 1
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 20
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 10
proto = icmp
chksum = None
src = 192.168.14.10
dst = 192.168.14.20
\options \
###[ ICMP ]###
type = echo-reply
code = 0
chksum = None
id = 0x70c
seq = 0x0
unused = ''
###[ Raw ]###
load = '\\xabqT\\x8a\\x85.fF\\xf64\\xbf:e\\xdcgb\x15\\xa5-\\xfaDZz\\x83\\xfa\\xe6\\xa90\\xd9\\xe0\\xcf\n@\n\x10\\xef\'\\xf9\\xa5\\xd0L\\x80\\xdc\\xc4L"\\xf4\\xf8\x0ef+\\xfb\\xa8_\\xeaꔖ\\x94\x06%\\xe16i'
2023-08-27 09:49:54,679: INFO: Sending out all flows
2023-08-27 09:49:54,730: INFO: Done sending all flows
2023-08-27 09:49:54,762: INFO: Module completed
Reveal Packet
Ethernet II, Src: Cisco_23:64:c1 (00:1c:58:23:64:c1), Dst: Cisco_64:33:41 (00:15:62:64:33:41)
Destination: Cisco_64:33:41 (00:15:62:64:33:41)
Source: Cisco_23:64:c1 (00:1c:58:23:64:c1)
Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 1
000. .... .... .... = Priority: Best Effort (default) (0)
...0 .... .... .... = DEI: Ineligible
.... 0000 0000 0001 = ID: 1
Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 20
000. .... .... .... = Priority: Best Effort (default) (0)
...0 .... .... .... = DEI: Ineligible
.... 0000 0001 0100 = ID: 20
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.14.10, Dst: 192.168.14.20
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 92
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 10
Protocol: ICMP (1)
Header Checksum: 0x1332 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.14.10
Destination Address: 192.168.14.20
Internet Control Message Protocol
Type: 0 (Echo (ping) reply)
Code: 0
Checksum: 0xdc45 [correct]
[Checksum Status: Good]
Identifier (BE): 1804 (0x070c)
Identifier (LE): 3079 (0x0c07)
Sequence Number (BE): 0 (0x0000)
Sequence Number (LE): 0 (0x0000)
Data (64 bytes)
The ARP module allows users to generate following ARP packets:
- ARP Request
- ARP Reply
This module supports:
- Multiple flows
- Packet count & Outgoing interface per flow
- Random automated packet generation
- Full manual packet generation
- Adding VLAN tags
Random packet generation
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 2
Enter the number of flows > 1
Building flow number [ 1 ]:
Generate random ARP Packet? (y/n) > y
ARP Type (req/resp) > req
Count (c for continous) > 5
Source Interface > et48
2023-08-27 10:22:42,431: INFO: ARP packet built
###[ Ethernet ]###
dst = ff:ff:ff:ff:ff:ff
src = c4:ca:2b:b1:f6:39
type = ARP
###[ ARP ]###
hwtype = Ethernet (10Mb)
ptype = IPv4
hwlen = None
plen = None
op = who-has
hwsrc = c4:ca:2b:b1:f6:39
psrc = 172.30.244.205
hwdst = 00:00:00:00:00:00
pdst = 172.16.68.167
2023-08-27 10:22:42,432: INFO: Sending out all flows
2023-08-27 10:22:42,474: INFO: Done sending all flows
2023-08-27 10:22:42,509: INFO: Module completed
Reveal Packet
Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Destination: Broadcast (ff:ff:ff:ff:ff:ff)
Source: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
Type: ARP (0x0806)
Address Resolution Protocol (request)
Hardware type: Ethernet (1)
Protocol type: IPv4 (0x0800)
Hardware size: 6
Protocol size: 4
Opcode: request (1)
Sender MAC address: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
Sender IP address: 172.30.244.205
Target MAC address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Target IP address: 172.16.68.167
Manual packet generation with VLAN Tag
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 2
Enter the number of flows > 1
Building flow number [ 1 ]:
Generate random ARP Packet? (y/n) > n
ARP Type (req/resp) > resp
Source MAC (de:ad:be:ef:ca:fe) > 00:1d:09:f0:92:ab
Destination MAC > 00:1a:6b:6c:0c:cc
Sender MAC > 00:1d:09:f0:92:ab
Sender IP > 10.10.10.1
Target MAC > 00:1a:6b:6c:0c:cc
Target IP > 10.10.10.2
Tag (y/n) > y
VLAN Tag (x,y) > 20
Count (c for continous) > 5
Source Interface > et48
2023-08-27 10:27:29,750: INFO: ARP packet built
###[ Ethernet ]###
dst = 00:1a:6b:6c:0c:cc
src = 00:1d:09:f0:92:ab
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 20
type = ARP
###[ ARP ]###
hwtype = Ethernet (10Mb)
ptype = IPv4
hwlen = None
plen = None
op = is-at
hwsrc = 00:1d:09:f0:92:ab
psrc = 10.10.10.1
hwdst = 00:1a:6b:6c:0c:cc
pdst = 10.10.10.2
2023-08-27 10:27:29,751: INFO: Sending out all flows
2023-08-27 10:27:29,802: INFO: Done sending all flows
2023-08-27 10:27:29,835: INFO: Module completed
Reveal Packet
Ethernet II, Src: Dell_f0:92:ab (00:1d:09:f0:92:ab), Dst: Universa_6c:0c:cc (00:1a:6b:6c:0c:cc)
Destination: Universa_6c:0c:cc (00:1a:6b:6c:0c:cc)
Source: Dell_f0:92:ab (00:1d:09:f0:92:ab)
Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 20
000. .... .... .... = Priority: Best Effort (default) (0)
...0 .... .... .... = DEI: Ineligible
.... 0000 0001 0100 = ID: 20
Type: ARP (0x0806)
Address Resolution Protocol (reply)
Hardware type: Ethernet (1)
Protocol type: IPv4 (0x0800)
Hardware size: 6
Protocol size: 4
Opcode: reply (2)
Sender MAC address: Dell_f0:92:ab (00:1d:09:f0:92:ab)
Sender IP address: 10.10.10.1
Target MAC address: Universa_6c:0c:cc (00:1a:6b:6c:0c:cc)
Target IP address: 10.10.10.2
The IGMP module allows users to generate following IGMP packets:
- v1
- Membership Query
- Membership Report
- v2
- Membership Query, General
- Membership Query, Group-Specific
- Membership Report
- Leave Group
- v3
- Membership Query, General
- Membership Query, Group-Specific
- Membership Query, Group-and-Source-Specific
- Membership Report
- Leave Group
This module supports:
- Multiple flows
- Packet count & Outgoing interface per flow
- Adding VLAN tags
Membership Query
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 3
Enter the number of flows > 1
Building flow number [ 1 ]:
IGMP Version (v1/v2/v3) > v1
IGMP Message Type:
1 -- Membership Query
2 -- Membership Report
Enter your choice (1-2) > 1
Sender MAC (de:ad:be:ef:ca:fe) > c4:ca:2b:b1:f6:39
Sender IP > 192.168.14.10
Tag (y/n) > n
Count (c for continous) > 5
Source Interface > et48
2023-08-27 10:39:04,770: INFO: IGMPv1 Membership Query Built
###[ Ethernet ]###
dst = 01:00:5e:00:00:01
src = c4:ca:2b:b1:f6:39
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 1
proto = igmp
chksum = None
src = 192.168.14.10
dst = 224.0.0.1
\options \
|###[ IP Option Router Alert ]###
| copy_flag = 1
| optclass = control
| option = router_alert
| length = 4
| alert = router_shall_examine_packet
###[ IGMP ]###
type = Group Membership Query
mrcode = 0
chksum = None
gaddr = 0.0.0.0
2023-08-27 10:39:04,772: INFO: Sending out all flows
2023-08-27 10:39:04,814: INFO: Done sending all flows
2023-08-27 10:39:04,848: INFO: Module completed
Reveal Packet
Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: IPv4mcast_01 (01:00:5e:00:00:01)
Destination: IPv4mcast_01 (01:00:5e:00:00:01)
Source: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.14.10, Dst: 224.0.0.1
0100 .... = Version: 4
.... 0110 = Header Length: 24 bytes (6)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 32
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 1
Protocol: IGMP (2)
Header Checksum: 0x7623 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.14.10
Destination Address: 224.0.0.1
Options: (4 bytes), Router Alert
Internet Group Management Protocol
[IGMP Version: 1]
Type: Membership Query (0x11)
Reserved: 00
Checksum: 0xeeff [correct]
[Checksum Status: Good]
Multicast Address: 0.0.0.0
Membership Report
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 3
Enter the number of flows > 1
Building flow number [ 1 ]:
IGMP Version (v1/v2/v3) > v1
IGMP Message Type:
1 -- Membership Query
2 -- Membership Report
Enter your choice (1-2) > 2
Sender MAC (de:ad:be:ef:ca:fe) > fa:16:3e:35:d1:43
Sender IP > 192.168.14.20
Multicast Address > 239.1.1.1
Tag (y/n) > y
VLAN Tag (x,y) > 10
Count (c for continous) > 5
Source Interface > et48
2023-08-27 10:43:11,658: INFO: IGMPv1 Membership Report
###[ Ethernet ]###
dst = 01:00:5e:01:01:01
src = fa:16:3e:35:d1:43
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 10
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 1
proto = igmp
chksum = None
src = 192.168.14.20
dst = 239.1.1.1
\options \
|###[ IP Option Router Alert ]###
| copy_flag = 1
| optclass = control
| option = router_alert
| length = 4
| alert = router_shall_examine_packet
###[ IGMP ]###
type = Version 1 - Membership Report
mrcode = 0
chksum = None
gaddr = 239.1.1.1
2023-08-27 10:43:11,659: INFO: Sending out all flows
2023-08-27 10:43:11,698: INFO: Done sending all flows
2023-08-27 10:43:11,733: INFO: Module completed
Reveal Packet
Ethernet II, Src: fa:16:3e:35:d1:43 (fa:16:3e:35:d1:43), Dst: IPv4mcast_01:01:01 (01:00:5e:01:01:01)
Destination: IPv4mcast_01:01:01 (01:00:5e:01:01:01)
Source: fa:16:3e:35:d1:43 (fa:16:3e:35:d1:43)
Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 10
000. .... .... .... = Priority: Best Effort (default) (0)
...0 .... .... .... = DEI: Ineligible
.... 0000 0000 1010 = ID: 10
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.14.20, Dst: 239.1.1.1
0100 .... = Version: 4
.... 0110 = Header Length: 24 bytes (6)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 32
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 1
Protocol: IGMP (2)
Header Checksum: 0x6618 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.14.20
Destination Address: 239.1.1.1
Options: (4 bytes), Router Alert
Internet Group Management Protocol
[IGMP Version: 1]
Type: Membership Report (0x12)
Reserved: 00
Checksum: 0xfdfc [correct]
[Checksum Status: Good]
Multicast Address: 239.1.1.1
Membership Query, General
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 3
Enter the number of flows > 1
Building flow number [ 1 ]:
IGMP Version (v1/v2/v3) > v2
IGMP Message Type:
1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Report
4 -- Leave Group
Enter your choice (1-4) > 1
Sender MAC (de:ad:be:ef:ca:fe) > 00:1b:11:10:26:11
Sender IP > 192.168.1.2
Tag (y/n) > n
Count (c for continous) > 5
Source Interface > et48
2023-08-28 11:48:45,172: INFO: IGMPv2 Membership Query Built
###[ Ethernet ]###
dst = 01:00:5e:00:00:01
src = 00:1b:11:10:26:11
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 1
proto = igmp
chksum = None
src = 192.168.1.2
dst = 224.0.0.1
\options \
|###[ IP Option Router Alert ]###
| copy_flag = 1
| optclass = control
| option = router_alert
| length = 4
| alert = router_shall_examine_packet
###[ IGMP ]###
type = Group Membership Query
mrcode = 20
chksum = None
gaddr = 0.0.0.0
2023-08-28 11:48:45,173: INFO: Sending out all flows
2023-08-28 11:48:45,214: INFO: Done sending all flows
2023-08-28 11:48:45,249: INFO: Module completed
Reveal Packet
Ethernet II, Src: D-Link_10:26:11 (00:1b:11:10:26:11), Dst: IPv4mcast_01 (01:00:5e:00:00:01)
Destination: IPv4mcast_01 (01:00:5e:00:00:01)
Source: D-Link_10:26:11 (00:1b:11:10:26:11)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 224.0.0.1
0100 .... = Version: 4
.... 0110 = Header Length: 24 bytes (6)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 32
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 1
Protocol: IGMP (2)
Header Checksum: 0x832b [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.2
Destination Address: 224.0.0.1
Options: (4 bytes), Router Alert
Internet Group Management Protocol
[IGMP Version: 2]
Type: Membership Query (0x11)
Max Resp Time: 2.0 sec (0x14)
Checksum: 0xeeeb [correct]
[Checksum Status: Good]
Multicast Address: 0.0.0.0
Membership Query, Group-Specific
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 3
Enter the number of flows > 1
Building flow number [ 1 ]:
IGMP Version (v1/v2/v3) > v2
IGMP Message Type:
1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Report
4 -- Leave Group
Enter your choice (1-4) > 2
Sender MAC (de:ad:be:ef:ca:fe) > 00:1b:11:10:26:11
Sender IP > 192.168.1.3
Multicast Address > 239.255.255.240
Tag (y/n) > y
VLAN Tag (x,y) > 10
Count (c for continous) > 5
Source Interface > et48
2023-08-28 11:51:27,134: INFO: IGMPv2 Membership Query, Group specific
###[ Ethernet ]###
dst = 01:00:5e:7f:ff:f0
src = 00:1b:11:10:26:11
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 10
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 1
proto = igmp
chksum = None
src = 192.168.1.3
dst = 239.255.255.240
\options \
|###[ IP Option Router Alert ]###
| copy_flag = 1
| optclass = control
| option = router_alert
| length = 4
| alert = router_shall_examine_packet
###[ IGMP ]###
type = Group Membership Query
mrcode = 20
chksum = None
gaddr = 239.255.255.240
2023-08-28 11:51:27,135: INFO: Sending out all flows
2023-08-28 11:51:27,182: INFO: Done sending all flows
2023-08-28 11:51:27,219: INFO: Module completed
Reveal Packet
Frame 24: 50 bytes on wire (400 bits), 50 bytes captured (400 bits) on interface -, id 0
Ethernet II, Src: D-Link_10:26:11 (00:1b:11:10:26:11), Dst: IPv4mcast_7f:ff:f0 (01:00:5e:7f:ff:f0)
Destination: IPv4mcast_7f:ff:f0 (01:00:5e:7f:ff:f0)
Source: D-Link_10:26:11 (00:1b:11:10:26:11)
Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 10
Internet Protocol Version 4, Src: 192.168.1.3, Dst: 239.255.255.240
0100 .... = Version: 4
.... 0110 = Header Length: 24 bytes (6)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 32
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 1
Protocol: IGMP (2)
Header Checksum: 0x733b [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.3
Destination Address: 239.255.255.240
Options: (4 bytes), Router Alert
Internet Group Management Protocol
[IGMP Version: 2]
Type: Membership Query (0x11)
Max Resp Time: 2.0 sec (0x14)
Checksum: 0xfefa [correct]
[Checksum Status: Good]
Multicast Address: 239.255.255.240
Membership Report
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 3
Enter the number of flows > 1
Building flow number [ 1 ]:
IGMP Version (v1/v2/v3) > v2
IGMP Message Type:
1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Report
4 -- Leave Group
Enter your choice (1-4) > 3
Sender MAC (de:ad:be:ef:ca:fe) > 00:1b:11:10:26:11
Sender IP > 192.168.1.3
Multicast Address > 225.1.1.4
Tag (y/n) > n
Count (c for continous) > 5
Source Interface > et48
2023-08-28 11:55:05,699: INFO: IGMPv2 Membership Report
###[ Ethernet ]###
dst = 01:00:5e:01:01:04
src = 00:1b:11:10:26:11
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 1
proto = igmp
chksum = None
src = 192.168.1.3
dst = 225.1.1.4
\options \
|###[ IP Option Router Alert ]###
| copy_flag = 1
| optclass = control
| option = router_alert
| length = 4
| alert = router_shall_examine_packet
###[ IGMP ]###
type = Version 2 - Membership Report
mrcode = 0
chksum = None
gaddr = 225.1.1.4
2023-08-28 11:55:05,699: INFO: Sending out all flows
2023-08-28 11:55:05,738: INFO: Done sending all flows
2023-08-28 11:55:05,770: INFO: Module completed
Reveal Packet
Ethernet II, Src: D-Link_10:26:11 (00:1b:11:10:26:11), Dst: IPv4mcast_01:01:04 (01:00:5e:01:01:04)
Destination: IPv4mcast_01:01:04 (01:00:5e:01:01:04)
Source: D-Link_10:26:11 (00:1b:11:10:26:11)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.3, Dst: 225.1.1.4
0100 .... = Version: 4
.... 0110 = Header Length: 24 bytes (6)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 32
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 1
Protocol: IGMP (2)
Header Checksum: 0x8126 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.3
Destination Address: 225.1.1.4
Options: (4 bytes), Router Alert
Internet Group Management Protocol
[IGMP Version: 2]
Type: Membership Report (0x16)
Max Resp Time: 0.0 sec (0x00)
Checksum: 0x07fa [correct]
[Checksum Status: Good]
Multicast Address: 225.1.1.4
Leave Group
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 3
Enter the number of flows > 1
Building flow number [ 1 ]:
IGMP Version (v1/v2/v3) > v2
IGMP Message Type:
1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Report
4 -- Leave Group
Enter your choice (1-4) > 4
Sender MAC (de:ad:be:ef:ca:fe) > 00:1b:11:10:26:11
Sender IP > 192.168.1.5
Multicast Address > 225.1.1.4
Tag (y/n) > y
VLAN Tag > 20
Count (c for continous) > 5
Source Interface > et48
2023-08-28 11:57:04,380: INFO: IGMPv2 Leave Message
###[ Ethernet ]###
dst = 01:00:5e:00:00:02
src = 00:1b:11:10:26:11
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 20
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 1
proto = igmp
chksum = None
src = 192.168.1.5
dst = 224.0.0.2
\options \
|###[ IP Option Router Alert ]###
| copy_flag = 1
| optclass = control
| option = router_alert
| length = 4
| alert = router_shall_examine_packet
###[ IGMP ]###
type = Leave Group
mrcode = 0
chksum = None
gaddr = 225.1.1.4
2023-08-28 11:57:04,381: INFO: Sending out all flows
2023-08-28 11:57:04,454: INFO: Done sending all flows
2023-08-28 11:57:04,487: INFO: Module completed
Reveal Packet
Ethernet II, Src: D-Link_10:26:11 (00:1b:11:10:26:11), Dst: IPv4mcast_02 (01:00:5e:00:00:02)
Destination: IPv4mcast_02 (01:00:5e:00:00:02)
Source: D-Link_10:26:11 (00:1b:11:10:26:11)
Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 20
000. .... .... .... = Priority: Best Effort (default) (0)
...0 .... .... .... = DEI: Ineligible
.... 0000 0001 0100 = ID: 20
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.5, Dst: 224.0.0.2
0100 .... = Version: 4
.... 0110 = Header Length: 24 bytes (6)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 32
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 1
Protocol: IGMP (2)
Header Checksum: 0x8327 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.5
Destination Address: 224.0.0.2
Options: (4 bytes), Router Alert
Internet Group Management Protocol
[IGMP Version: 2]
Type: Leave Group (0x17)
Max Resp Time: 0.0 sec (0x00)
Checksum: 0x06fa [correct]
[Checksum Status: Good]
Multicast Address: 225.1.1.4
Membership Query, General
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 3
Enter the number of flows > 1
Building flow number [ 1 ]:
IGMP Version (v1/v2/v3) > v3
IGMP Message Type:
1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Query, Group-and-Source-Specific
4 -- Membership Report
5 -- Leave Group
Enter your choice (1-5) > 1
Sender MAC (de:ad:be:ef:ca:fe) > 00:26:44:6c:1e:da
Sender IP > 192.168.1.25
Tag (y/n) > n
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:10:34,991: INFO: IGMPv3 Membership Query Built
###[ Ethernet ]###
dst = 01:00:5e:00:00:01
src = 00:26:44:6c:1e:da
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0xc0
len = None
id = 1
flags =
frag = 0
ttl = 1
proto = igmp
chksum = None
src = 192.168.1.25
dst = 224.0.0.1
\options \
|###[ IP Option Router Alert ]###
| copy_flag = 1
| optclass = control
| option = router_alert
| length = 4
| alert = router_shall_examine_packet
###[ IGMPv3 ]###
type = Membership Query
mrcode = 20
chksum = None
###[ IGMPv3mq ]###
gaddr = 0.0.0.0
resv = 0
s = 0
qrv = 0
qqic = 0
numsrc = None
srcaddrs = []
2023-08-28 12:10:34,992: INFO: Sending out all flows
2023-08-28 12:10:35,038: INFO: Done sending all flows
2023-08-28 12:10:35,071: INFO: Module completed
Reveal Packet
Ethernet II, Src: ThomsonT_6c:1e:da (00:26:44:6c:1e:da), Dst: IPv4mcast_01 (01:00:5e:00:00:01)
Destination: IPv4mcast_01 (01:00:5e:00:00:01)
Source: ThomsonT_6c:1e:da (00:26:44:6c:1e:da)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.25, Dst: 224.0.0.1
0100 .... = Version: 4
.... 0110 = Header Length: 24 bytes (6)
Differentiated Services Field: 0xc0 (DSCP: CS6, ECN: Not-ECT)
Total Length: 36
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 1
Protocol: IGMP (2)
Header Checksum: 0x8250 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.25
Destination Address: 224.0.0.1
Options: (4 bytes), Router Alert
Internet Group Management Protocol
[IGMP Version: 3]
Type: Membership Query (0x11)
Max Resp Time: 2.0 sec (0x14)
Checksum: 0xeeeb [correct]
[Checksum Status: Good]
Multicast Address: 0.0.0.0
.... 0... = S: Do not suppress router side processing
.... .000 = QRV: 0
QQIC: 0
Num Src: 0
Membership Query, Group-Specific
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 3
Enter the number of flows > 1
Building flow number [ 1 ]:
IGMP Version (v1/v2/v3) > v3
IGMP Message Type:
1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Query, Group-and-Source-Specific
4 -- Membership Report
5 -- Leave Group
Enter your choice (1-5) > 2
Sender MAC (de:ad:be:ef:ca:fe) > 00:1b:11:10:26:11
Sender IP > 192.168.12.10
Multicast Address > 225.1.1.3
Tag (y/n) > n
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:12:46,734: INFO: IGMPv3 Membership Query, Group specific
###[ Ethernet ]###
dst = 01:00:5e:01:01:03
src = 00:1b:11:10:26:11
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0xc0
len = None
id = 1
flags =
frag = 0
ttl = 1
proto = igmp
chksum = None
src = 192.168.12.10
dst = 225.1.1.3
\options \
|###[ IP Option Router Alert ]###
| copy_flag = 1
| optclass = control
| option = router_alert
| length = 4
| alert = router_shall_examine_packet
###[ IGMPv3 ]###
type = Membership Query
mrcode = 20
chksum = None
###[ IGMPv3mq ]###
gaddr = 225.1.1.3
resv = 0
s = 0
qrv = 0
qqic = 0
numsrc = None
srcaddrs = []
2023-08-28 12:12:46,735: INFO: Sending out all flows
2023-08-28 12:12:46,794: INFO: Done sending all flows
2023-08-28 12:12:46,827: INFO: Module completed
Reveal Packet
Ethernet II, Src: D-Link_10:26:11 (00:1b:11:10:26:11), Dst: IPv4mcast_01:01:03 (01:00:5e:01:01:03)
Destination: IPv4mcast_01:01:03 (01:00:5e:01:01:03)
Source: D-Link_10:26:11 (00:1b:11:10:26:11)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.12.10, Dst: 225.1.1.3
0100 .... = Version: 4
.... 0110 = Header Length: 24 bytes (6)
Differentiated Services Field: 0xc0 (DSCP: CS6, ECN: Not-ECT)
Total Length: 36
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 1
Protocol: IGMP (2)
Header Checksum: 0x755c [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.12.10
Destination Address: 225.1.1.3
Options: (4 bytes), Router Alert
Internet Group Management Protocol
[IGMP Version: 3]
Type: Membership Query (0x11)
Max Resp Time: 2.0 sec (0x14)
Checksum: 0x0ce7 [correct]
[Checksum Status: Good]
Multicast Address: 225.1.1.3
.... 0... = S: Do not suppress router side processing
.... .000 = QRV: 0
QQIC: 0
Num Src: 0
Membership Query, Group-and-Source-Specific
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 3
Enter the number of flows > 1
Building flow number [ 1 ]:
IGMP Version (v1/v2/v3) > v3
IGMP Message Type:
1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Query, Group-and-Source-Specific
4 -- Membership Report
5 -- Leave Group
Enter your choice (1-5) > 3
Sender MAC (de:ad:be:ef:ca:fe) > fa:16:3e:e4:d3:de
Sender IP > 192.168.1.1
Multicast Address > 239.1.1.1
Source Address > 1.1.1.1
Tag (y/n) > n
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:15:35,469: INFO: IGMPv3 Membership Query, Group & Source specific
###[ Ethernet ]###
dst = 01:00:5e:01:01:01
src = fa:16:3e:e4:d3:de
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0xc0
len = None
id = 1
flags =
frag = 0
ttl = 1
proto = igmp
chksum = None
src = 192.168.1.1
dst = 239.1.1.1
\options \
|###[ IP Option Router Alert ]###
| copy_flag = 1
| optclass = control
| option = router_alert
| length = 4
| alert = router_shall_examine_packet
###[ IGMPv3 ]###
type = Membership Query
mrcode = 20
chksum = None
###[ IGMPv3mq ]###
gaddr = 239.1.1.1
resv = 0
s = 0
qrv = 0
qqic = 0
numsrc = 1
srcaddrs = [1.1.1.1]
2023-08-28 12:15:35,470: INFO: Sending out all flows
2023-08-28 12:15:35,514: INFO: Done sending all flows
2023-08-28 12:15:35,548: INFO: Module completed
Reveal Packet
Ethernet II, Src: fa:16:3e:e4:d3:de (fa:16:3e:e4:d3:de), Dst: IPv4mcast_01:01:01 (01:00:5e:01:01:01)
Destination: IPv4mcast_01:01:01 (01:00:5e:01:01:01)
Source: fa:16:3e:e4:d3:de (fa:16:3e:e4:d3:de)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.1, Dst: 239.1.1.1
0100 .... = Version: 4
.... 0110 = Header Length: 24 bytes (6)
Differentiated Services Field: 0xc0 (DSCP: CS6, ECN: Not-ECT)
Total Length: 40
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 1
Protocol: IGMP (2)
Header Checksum: 0x7263 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.1
Destination Address: 239.1.1.1
Options: (4 bytes), Router Alert
Internet Group Management Protocol
[IGMP Version: 3]
Type: Membership Query (0x11)
Max Resp Time: 2.0 sec (0x14)
Checksum: 0xfce5 [correct]
[Checksum Status: Good]
Multicast Address: 239.1.1.1
.... 0... = S: Do not suppress router side processing
.... .000 = QRV: 0
QQIC: 0
Num Src: 1
Source Address: 1.1.1.1
Membership Report
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 3
Enter the number of flows > 1
Building flow number [ 1 ]:
IGMP Version (v1/v2/v3) > v3
IGMP Message Type:
1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Query, Group-and-Source-Specific
4 -- Membership Report
5 -- Leave Group
Enter your choice (1-5) > 4
Sender MAC (de:ad:be:ef:ca:fe) > 00:25:2e:51c3:81
Sender IP > 192.168.1.6
Tag (y/n) > n
Number of group records > 1
Group record 1:
Multicast Address > 239.255.255.250
Record Type:
1 -- Mode Is Include
2 -- Mode Is Exclude
3 -- Change To Include Mode
4 -- Change To Exclude Mode
5 -- Allow New Sources
6 -- Block Old Sources
Enter your choice (1-6) > 1
Source addresses (IP1,IP2) > 1.1.1.1
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:23:14,498: INFO: IGMPv3 Membership Report
###[ Ethernet ]###
dst = 01:00:5e:00:00:16
src = 00:25:2e:51c3:81
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0xc0
len = None
id = 1
flags =
frag = 0
ttl = 1
proto = igmp
chksum = None
src = 192.168.1.6
dst = 224.0.0.22
\options \
|###[ IP Option Router Alert ]###
| copy_flag = 1
| optclass = control
| option = router_alert
| length = 4
| alert = router_shall_examine_packet
###[ IGMPv3 ]###
type = Version 3 Membership Report
mrcode = 0
chksum = None
###[ IGMPv3mr ]###
res2 = 0x0
numgrp = 1
\records \
|###[ IGMPv3gr ]###
| rtype = Mode Is Include
| auxdlen = 0
| numsrc = 1
| maddr = 239.255.255.250
| srcaddrs = [1.1.1.1]
2023-08-28 12:23:14,500: INFO: Sending out all flows
2023-08-28 12:23:14,546: INFO: Done sending all flows
2023-08-28 12:23:14,580: INFO: Module completed
Reveal Packet
Ethernet II, Src: 30:30:3a:32:35:3a (30:30:3a:32:35:3a), Dst: IPv4mcast_16 (01:00:5e:00:00:16)
Destination: IPv4mcast_16 (01:00:5e:00:00:16)
Source: 30:30:3a:32:35:3a (30:30:3a:32:35:3a)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.6, Dst: 224.0.0.22
0100 .... = Version: 4
.... 0110 = Header Length: 24 bytes (6)
Differentiated Services Field: 0xc0 (DSCP: CS6, ECN: Not-ECT)
Total Length: 44
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 1
Protocol: IGMP (2)
Header Checksum: 0x8246 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.6
Destination Address: 224.0.0.22
Options: (4 bytes), Router Alert
Internet Group Management Protocol
[IGMP Version: 3]
Type: Membership Report (0x22)
Reserved: 00
Checksum: 0xeb00 [correct]
[Checksum Status: Good]
Reserved: 0000
Num Group Records: 1
Group Record : 239.255.255.250 Mode Is Include
Record Type: Mode Is Include (1)
Aux Data Len: 0
Num Src: 1
Multicast Address: 239.255.255.250
Source Address: 1.1.1.1
Leave Group
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 3
Enter the number of flows > 1
Building flow number [ 1 ]:
IGMP Version (v1/v2/v3) > v3
IGMP Message Type:
1 -- Membership Query, General
2 -- Membership Query, Group-Specific
3 -- Membership Query, Group-and-Source-Specific
4 -- Membership Report
5 -- Leave Group
Enter your choice (1-5) > 5
Sender MAC (de:ad:be:ef:ca:fe) > 00:25:2e:51c3:81
Sender IP > 192.168.1.6
Tag (y/n) > n
Number of group records > 1
Group record 1:
Multicast Address > 239.1.1.1
Source addresses (IP1,IP2) > 1.1.1.1
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:26:12,015: INFO: IGMPv3 Leave Message
###[ Ethernet ]###
dst = 01:00:5e:00:00:16
src = 00:25:2e:51c3:81
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0xc0
len = None
id = 1
flags =
frag = 0
ttl = 1
proto = igmp
chksum = None
src = 192.168.1.6
dst = 224.0.0.22
\options \
|###[ IP Option Router Alert ]###
| copy_flag = 1
| optclass = control
| option = router_alert
| length = 4
| alert = router_shall_examine_packet
###[ IGMPv3 ]###
type = Version 3 Membership Report
mrcode = 0
chksum = None
###[ IGMPv3mr ]###
res2 = 0x0
numgrp = 1
\records \
|###[ IGMPv3gr ]###
| rtype = Block Old Sources
| auxdlen = 0
| numsrc = 1
| maddr = 239.1.1.1
| srcaddrs = [1.1.1.1]
2023-08-28 12:26:12,016: INFO: Sending out all flows
2023-08-28 12:26:12,074: INFO: Done sending all flows
2023-08-28 12:26:12,109: INFO: Module completed
Reveal Packet
Ethernet II, Src: 30:30:3a:32:35:3a (30:30:3a:32:35:3a), Dst: IPv4mcast_16 (01:00:5e:00:00:16)
Destination: IPv4mcast_16 (01:00:5e:00:00:16)
Source: 30:30:3a:32:35:3a (30:30:3a:32:35:3a)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.6, Dst: 224.0.0.22
0100 .... = Version: 4
.... 0110 = Header Length: 24 bytes (6)
Differentiated Services Field: 0xc0 (DSCP: CS6, ECN: Not-ECT)
Total Length: 44
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 1
Protocol: IGMP (2)
Header Checksum: 0x8246 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.6
Destination Address: 224.0.0.22
Options: (4 bytes), Router Alert
Internet Group Management Protocol
[IGMP Version: 3]
Type: Membership Report (0x22)
Reserved: 00
Checksum: 0xe5f8 [correct]
[Checksum Status: Good]
Reserved: 0000
Num Group Records: 1
Group Record : 239.1.1.1 Block Old Sources
Record Type: Block Old Sources (6)
Aux Data Len: 0
Num Src: 1
Multicast Address: 239.1.1.1
Source Address: 1.1.1.1
Random packet generation
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 4
Enter the number of flows > 1
Building flow number [ 1 ]:
Random Multicast Packet? (y/n) > y
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:31:45,829: INFO: Multicast Packet built
###[ Ethernet ]###
dst = 01:00:5e:2c:58:6b
src = c4:ca:2b:b1:f6:39
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 251
proto = udp
chksum = None
src = 172.17.46.60
dst = 239.172.88.107
\options \
###[ UDP ]###
sport = 54840
dport = 54840
len = None
chksum = None
###[ Raw ]###
load = '\t\\xdd*\\xa1\\xe3\\x86:ų\\xa5\\x9b~P}\\xbc\\xaa~g\x17H\\x81\\xf0\x06\\xe3\\xef4\x0e\\x91\\wt\\x92\\xdcBa+\x1f\\xf0&h\\xf3\\xb1U\\xf2\\xcee\\xc1\\xf2\\xba_\\xe6\\x8e#>\\x90\\xaee\\x9dn\\xed%\\x9f\\xaf\\x9f'
2023-08-28 12:31:45,830: INFO: Sending out all flows
2023-08-28 12:31:45,902: INFO: Done sending all flows
2023-08-28 12:31:45,935: INFO: Module completed
Reveal Packet
Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: IPv4mcast_2c:58:6b (01:00:5e:2c:58:6b)
Destination: IPv4mcast_2c:58:6b (01:00:5e:2c:58:6b)
Source: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 172.17.46.60, Dst: 239.172.88.107
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 92
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 251
Protocol: UDP (17)
Header Checksum: 0x9d2a [validation disabled]
[Header checksum status: Unverified]
Source Address: 172.17.46.60
Destination Address: 239.172.88.107
User Datagram Protocol, Src Port: 54840, Dst Port: 54840
Data (64 bytes)
Manual packet generation with VLAN Tag
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 4
Enter the number of flows > 1
Building flow number [ 1 ]:
Random Multicast Packet? (y/n) > n
Source MAC (de:ad:be:ef:ca:fe) > c4:ca:2b:b1:f6:39
Source IP > 192.168.1.6
Destination IP > 239.1.1.1
UDP Source Port > 65535
UDP Destination Port > 54840
Tag (y/n) > y
VLAN Tag (x,y) > 10
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:33:14,323: INFO: UDP Packet built
###[ Ethernet ]###
dst = 01:00:5e:01:01:01
src = c4:ca:2b:b1:f6:39
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 10
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 28
proto = udp
chksum = None
src = 192.168.1.6
dst = 239.1.1.1
\options \
###[ UDP ]###
sport = 65535
dport = 54840
len = None
chksum = None
###[ Raw ]###
load = '\\xdes\\xc3i\x0b\\x92\\xc3\x02\\x9b\\x8f\t$\\x9f\x1a-\n\\xe1Y\\xea\x16\\xbe\\xedL5\\xf0\\x96\t\\xb9\\x8da\\xfcF.\t.Y[\\xb9b\\x8a\\x9a\\xbc=\\xbe<\x0bڸ\\xaf\x19\\x90\x15\\xf0\\xb4BT\\xa8\nA\\xed\\x91\\xe5_<'
2023-08-28 12:33:14,324: INFO: Sending out all flows
2023-08-28 12:33:14,374: INFO: Done sending all flows
2023-08-28 12:33:14,407: INFO: Module completed
Reveal Packet
Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: IPv4mcast_01:01:01 (01:00:5e:01:01:01)
Destination: IPv4mcast_01:01:01 (01:00:5e:01:01:01)
Source: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 10
000. .... .... .... = Priority: Best Effort (default) (0)
...0 .... .... .... = DEI: Ineligible
.... 0000 0000 1010 = ID: 10
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.6, Dst: 239.1.1.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 92
Identification: 0x0001 (1)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 28
Protocol: UDP (17)
Header Checksum: 0xecdf [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.6
Destination Address: 239.1.1.1
User Datagram Protocol, Src Port: 65535, Dst Port: 54840
Data (64 bytes)
Random packet generation
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 5
Enter the number of flows > 1
Building flow number [ 1 ]:
Packet Type:
1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP
Enter your choice (1-3) > 1
Generate random Vxlan ICMP Packet? (y/n) > y
ICMP Type (req/reply) > req
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:41:35,200: INFO: Inner ICMP packet built
2023-08-28 12:41:35,201: INFO: Vxlan ICMP Packet built
###[ Ethernet ]###
dst = 0d:30:87:12:39:ed
src = c4:ca:2b:b1:f6:39
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags = DF
frag = 0
ttl = 99
proto = udp
chksum = None
src = 192.162.13.74
dst = 192.162.178.122
\options \
###[ UDP ]###
sport = 54567
dport = 4789
len = None
chksum = None
###[ VXLAN ]###
flags = Instance
reserved1 = 0
vni = 0xac74a6
reserved2 = 0x0
###[ Ethernet ]###
dst = 86:20:71:ab:3d:b8
src = f2:8e:7b:69:57:61
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 58
proto = icmp
chksum = None
src = 172.29.136.163
dst = 172.26.193.124
\options \
###[ ICMP ]###
type = echo-request
code = 0
chksum = None
id = 0x28e
seq = 0x0
unused = ''
###[ Raw ]###
load = '\\xb4m\x16\x11\\x83\\x90Vp7jє\\x82\\x8b8@\\xd3pۍ\\x97\\x89\\xd6G\\xb0\\xc1A\\xd2\\xf1Gy\n\\xff\\x86J(1\x14\\xcd\\xe2\\xf4\\xdcht\\x84\x00\\xda\\xea\x03\\x87\\xd4\\xe2\\xd7\x046\\xce%\\xaf95\\x9d\\x838\\xb7'
2023-08-28 12:41:35,203: INFO: Sending out all flows
2023-08-28 12:41:35,263: INFO: Done sending all flows
2023-08-28 12:41:35,299: INFO: Module completed
Reveal Packet
Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: 0d:30:87:12:39:ed (0d:30:87:12:39:ed)
Internet Protocol Version 4, Src: 192.162.13.74, Dst: 192.162.178.122
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 142
Identification: 0x0001 (1)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 99
Protocol: UDP (17)
Header Checksum: 0xd654 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.162.13.74
Destination Address: 192.162.178.122
User Datagram Protocol, Src Port: 54567, Dst Port: 4789
Virtual eXtensible Local Area Network
Flags: 0x0800, VXLAN Network ID (VNI)
Group Policy ID: 0
VXLAN Network Identifier (VNI): 11302054
Reserved: 0
Ethernet II, Src: f2:8e:7b:69:57:61 (f2:8e:7b:69:57:61), Dst: 86:20:71:ab:3d:b8 (86:20:71:ab:3d:b8)
Internet Protocol Version 4, Src: 172.29.136.163, Dst: 172.26.193.124
Internet Control Message Protocol
Manual packet generation
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 5
Enter the number of flows > 1
Building flow number [ 1 ]:
Packet Type:
1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP
Enter your choice (1-3) > 1
Generate random Vxlan ICMP Packet? (y/n) > n
ICMP Type (req/reply) > req
Inner Source MAC (de:ad:be:ef:ca:fe) > 00:00:5e:00:53:65
Inner Destination MAC > 00:00:5e:00:53:66
Inner Source IP > 192.168.12.101
Inner Destination IP > 192.168.12.102
Inner TTL > 55
Outer Source MAC (de:ad:be:af:ca:fe) > 00:00:5e:00:53:11
Outer Destination MAC > 00:00:5e:00:53:22
Outer Source IP > 1.1.1.1
Outer Destination IP > 2.2.2.2
Outer UDP Source Port > 38139
Outer UDP Destination Port (default 4789) >
VNI > 1001
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:48:49,238: INFO: Inner ICMP packet built
2023-08-28 12:48:49,238: INFO: Vxlan ICMP Packet built
###[ Ethernet ]###
dst = 00:00:5e:00:53:22
src = 00:00:5e:00:53:11
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags = DF
frag = 0
ttl = 206
proto = udp
chksum = None
src = 1.1.1.1
dst = 2.2.2.2
\options \
###[ UDP ]###
sport = 38139
dport = 4789
len = None
chksum = None
###[ VXLAN ]###
flags = Instance
reserved1 = 0
vni = 0x3e9
reserved2 = 0x0
###[ Ethernet ]###
dst = 00:00:5e:00:53:66
src = 00:00:5e:00:53:65
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 55
proto = icmp
chksum = None
src = 192.168.12.101
dst = 192.168.12.102
\options \
###[ ICMP ]###
type = echo-request
code = 0
chksum = None
id = 0x32e
seq = 0x0
unused = ''
###[ Raw ]###
load = 'U\\x9aVA\x0ea\x14\x06\\xdb\\xefR\x03\\xdaΦ\\xb2\\xbc\\x9c\x07Z\\xb2"\\xfdu\\xb2\\xe3\\xa1\\xebKZa0/*\'rl\\x91\\x8f^eT^5\x02\\xf9KhM\\x86S^\\xc9!\\x9c\\xab0\\xed_F\\xf4\\x94i\\x90'
2023-08-28 12:48:49,240: INFO: Sending out all flows
2023-08-28 12:48:49,286: INFO: Done sending all flows
2023-08-28 12:48:49,319: INFO: Module completed
Reveal Packet
Ethernet II, Src: ICANNIAN_00:53:11 (00:00:5e:00:53:11), Dst: ICANNIAN_00:53:22 (00:00:5e:00:53:22)
Internet Protocol Version 4, Src: 1.1.1.1, Dst: 2.2.2.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 142
Identification: 0x0001 (1)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 206
Protocol: UDP (17)
Header Checksum: 0xa658 [validation disabled]
[Header checksum status: Unverified]
Source Address: 1.1.1.1
Destination Address: 2.2.2.2
User Datagram Protocol, Src Port: 38139, Dst Port: 4789
Virtual eXtensible Local Area Network
Flags: 0x0800, VXLAN Network ID (VNI)
Group Policy ID: 0
VXLAN Network Identifier (VNI): 1001
Reserved: 0
Ethernet II, Src: ICANNIAN_00:53:65 (00:00:5e:00:53:65), Dst: ICANNIAN_00:53:66 (00:00:5e:00:53:66)
Internet Protocol Version 4, Src: 192.168.12.101, Dst: 192.168.12.102
Internet Control Message Protocol
Random packet generation
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 5
Enter the number of flows > 1
Building flow number [ 1 ]:
Packet Type:
1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP
Enter your choice (1-3) > 2
Generate random Vxlan UDP Packet? (y/n) > y
Count (c for continous) > 5
Source Interface > et48
2023-08-28 12:54:46,123: INFO: Inner UDP packet built
2023-08-28 12:54:46,124: INFO: Vxlan UDP Packet built
###[ Ethernet ]###
dst = d4:4b:03:f3:1a:10
src = c4:ca:2b:b1:f6:39
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags = DF
frag = 0
ttl = 99
proto = udp
chksum = None
src = 192.167.64.242
dst = 192.163.191.98
\options \
###[ UDP ]###
sport = 49736
dport = 4789
len = None
chksum = None
###[ VXLAN ]###
flags = Instance
reserved1 = 0
vni = 0xfc0c15
reserved2 = 0x0
###[ Ethernet ]###
dst = 7a:e7:3a:cc:28:36
src = 46:22:d7:f9:f5:90
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 86
proto = udp
chksum = None
src = 172.22.41.69
dst = 172.24.26.69
\options \
###[ UDP ]###
sport = 49741
dport = 49741
len = None
chksum = None
###[ Raw ]###
load = "QZZ\\xd6ޭ.\\x8b\\xca\\xe5VC\\x99\x12'\\xdd\x0475:\\xf1P\\x95\\xd2Tb\\xf3Is4\r\\xbe\\x99\\x84\\xb9\\xbf2\\xa8\\xdf\\xee\\xfb\\xd4\\xf5b\x0e\\x97p\\xcb\n\\xa3\\x80]\x08\\xba\\x9df徱?&\\\x1d3"
2023-08-28 12:54:46,125: INFO: Sending out all flows
2023-08-28 12:54:46,182: INFO: Done sending all flows
2023-08-28 12:54:46,215: INFO: Module completed
Reveal Packet
Frame 122: 156 bytes on wire (1248 bits), 156 bytes captured (1248 bits) on interface -, id 0
Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: d4:4b:03:f3:1a:10 (d4:4b:03:f3:1a:10)
Internet Protocol Version 4, Src: 192.167.64.242, Dst: 192.163.191.98
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 142
Identification: 0x0001 (1)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 99
Protocol: UDP (17)
Header Checksum: 0x95be [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.167.64.242
Destination Address: 192.163.191.98
User Datagram Protocol, Src Port: 49736, Dst Port: 4789
Virtual eXtensible Local Area Network
Flags: 0x0800, VXLAN Network ID (VNI)
Group Policy ID: 0
VXLAN Network Identifier (VNI): 16518165
Reserved: 0
Ethernet II, Src: 46:22:d7:f9:f5:90 (46:22:d7:f9:f5:90), Dst: 7a:e7:3a:cc:28:36 (7a:e7:3a:cc:28:36)
Internet Protocol Version 4, Src: 172.22.41.69, Dst: 172.24.26.69
User Datagram Protocol, Src Port: 49741, Dst Port: 49741
Data (64 bytes)
Manual packet generation
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 5
Enter the number of flows > 1
Building flow number [ 1 ]:
Packet Type:
1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP
Enter your choice (1-3) > 2
Generate random Vxlan UDP Packet? (y/n) > n
Inner Source MAC (de:ad:be:ef:ca:fe) > ba:ad:be:ef:ca:Fe
Inner Destination MAC > de:ad:be:ef:ca:fe
Inner Source IP > 192.168.15.10
Inner Destination IP > 192.168.15.20
Inner UDP Source Port > 65535
Inner UDP Destination Port > 8008
Outer Source MAC (de:ad:be:af:ca:fe) > e4:3e:92:43:19:23
Outer Destination MAC > c4:ca:2b:b1:f6:39
Outer Source IP > 4.4.4.4
Outer Destination IP > 5.5.5.5
Outer UDP Source Port > 38139
Outer UDP Destination Port (default 4789) >
VNI > 10020
Count (c for continous) > 5
Source Interface > et48
2023-08-28 13:10:47,597: INFO: Inner UDP packet built
2023-08-28 13:10:47,597: INFO: Vxlan UDP Packet built
###[ Ethernet ]###
dst = c4:ca:2b:b1:f6:39
src = e4:3e:92:43:19:23
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags = DF
frag = 0
ttl = 154
proto = udp
chksum = None
src = 4.4.4.4
dst = 5.5.5.5
\options \
###[ UDP ]###
sport = 38139
dport = 4789
len = None
chksum = None
###[ VXLAN ]###
flags = Instance
reserved1 = 0
vni = 0x2724
reserved2 = 0x0
###[ Ethernet ]###
dst = de:ad:be:ef:ca:fe
src = ba:ad:be:ef:ca:Fe
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 143
proto = udp
chksum = None
src = 192.168.15.10
dst = 192.168.15.20
\options \
###[ UDP ]###
sport = 65535
dport = 8008
len = None
chksum = None
###[ Raw ]###
load = '\\xa2IO\x1c\x0c\\xd1G\x06u|f7I\\xacX\\xf3+\x1e\\xbf\\x80V\\x9e\\xa7\\x97\\x95\\xac\\xfb\\x8a\\xaa\\x80\x1d\\x8f\\xc9T\rM\\xc0\\x8e\\xb1\\x90\\xf6А߬\\xa8 ]\\xad8@\\xcdܱ\\xfc\\x80\\xe3\\xe2\\xa0\\xf1A\\xde\x1e\\xb1'
2023-08-28 13:10:47,599: INFO: Sending out all flows
2023-08-28 13:10:47,642: INFO: Done sending all flows
2023-08-28 13:10:47,676: INFO: Module completed
Reveal Packet
Ethernet II, Src: e4:3e:92:43:19:23 (e4:3e:92:43:19:23), Dst: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39)
Internet Protocol Version 4, Src: 4.4.4.4, Dst: 5.5.5.5
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 142
Identification: 0x0001 (1)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 154
Protocol: UDP (17)
Header Checksum: 0xce4c [validation disabled]
[Header checksum status: Unverified]
Source Address: 4.4.4.4
Destination Address: 5.5.5.5
User Datagram Protocol, Src Port: 38139, Dst Port: 4789
Virtual eXtensible Local Area Network
Flags: 0x0800, VXLAN Network ID (VNI)
Group Policy ID: 0
VXLAN Network Identifier (VNI): 10020
Reserved: 0
Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: de:ad:be:ef:ca:fe (de:ad:be:ef:ca:fe)
Internet Protocol Version 4, Src: 192.168.15.10, Dst: 192.168.15.20
User Datagram Protocol, Src Port: 65535, Dst Port: 8008
Data (64 bytes)
Random packet generation
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 5
Enter the number of flows > 1
Building flow number [ 1 ]:
Packet Type:
1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP
Enter your choice (1-3) > 3
Generate random Vxlan TCP Packet? (y/n) > y
Count (c for continous) > 5
Source Interface > et48
2023-08-28 13:14:54,968: INFO: Inner TCP packet built
2023-08-28 13:14:54,968: INFO: Vxlan TCP Packet built
###[ Ethernet ]###
dst = 64:d3:32:7c:f0:95
src = c4:ca:2b:b1:f6:39
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags = DF
frag = 0
ttl = 86
proto = udp
chksum = None
src = 192.173.127.171
dst = 192.161.190.8
\options \
###[ UDP ]###
sport = 54702
dport = 4789
len = None
chksum = None
###[ VXLAN ]###
flags = Instance
reserved1 = 0
vni = 0xdd07ee
reserved2 = 0x0
###[ Ethernet ]###
dst = 84:f9:0a:e5:84:2e
src = 53:89:a9:c0:82:92
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 81
proto = tcp
chksum = None
src = 172.31.28.152
dst = 172.30.88.163
\options \
###[ TCP ]###
sport = 63779
dport = <RandShort>
seq = 0
ack = 0
dataofs = None
reserved = 0
flags = S
window = 8192
chksum = None
urgptr = 0
options = ''
2023-08-28 13:14:54,970: INFO: Sending out all flows
2023-08-28 13:14:55,034: INFO: Done sending all flows
2023-08-28 13:14:55,067: INFO: Module completed
Reveal Packet
Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: 64:d3:32:7c:f0:95 (64:d3:32:7c:f0:95)
Internet Protocol Version 4, Src: 192.173.127.171, Dst: 192.161.190.8
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 90
Identification: 0x0001 (1)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 86
Protocol: UDP (17)
Header Checksum: 0x658f [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.173.127.171
Destination Address: 192.161.190.8
User Datagram Protocol, Src Port: 54702, Dst Port: 4789
Virtual eXtensible Local Area Network
Flags: 0x0800, VXLAN Network ID (VNI)
Group Policy ID: 0
VXLAN Network Identifier (VNI): 14485486
Reserved: 0
Ethernet II, Src: 53:89:a9:c0:82:92 (53:89:a9:c0:82:92), Dst: 84:f9:0a:e5:84:2e (84:f9:0a:e5:84:2e)
Internet Protocol Version 4, Src: 172.31.28.152, Dst: 172.30.88.163
Transmission Control Protocol, Src Port: 63779, Dst Port: 9808, Seq: 0, Len: 0
Manual packet generation
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 5
Enter the number of flows > 1
Building flow number [ 1 ]:
Packet Type:
1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP
Enter your choice (1-3) > 3
Generate random Vxlan TCP Packet? (y/n) > n
Inner Source MAC (de:ad:be:ef:ca:fe) > ba:ad:be:ef:ca:fe
Inner Destination MAC > de:ad:be:ef:ca:fe
Inner Source IP > 192.168.11.1
Inner Destination IP > 192.168.11.2
Inner TCP Source Port > 54838
Inner TCP Destination Port > 80
Outer Source MAC (de:ad:be:af:ca:fe) > c4:ca:2b:b1:f6:39
Outer Destination MAC > 31:05:92:3e:ff:a2
Outer Source IP > 1.1.1.1
Outer Destination IP > 2.2.2.2
Outer UDP Source Port > 63258
Outer UDP Destination Port (default 4789) >
VNI > 2002
Count (c for continous) > 5
Source Interface > et48
2023-08-28 13:18:47,801: INFO: Inner TCP packet built
2023-08-28 13:18:47,801: INFO: Vxlan TCP Packet built
###[ Ethernet ]###
dst = 31:05:92:3e:ff:a2
src = c4:ca:2b:b1:f6:39
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags = DF
frag = 0
ttl = 145
proto = udp
chksum = None
src = 1.1.1.1
dst = 2.2.2.2
\options \
###[ UDP ]###
sport = 63258
dport = 4789
len = None
chksum = None
###[ VXLAN ]###
flags = Instance
reserved1 = 0
vni = 0x7d2
reserved2 = 0x0
###[ Ethernet ]###
dst = de:ad:be:ef:ca:fe
src = ba:ad:Be:ef:ca:fe
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 169
proto = tcp
chksum = None
src = 192.168.11.1
dst = 192.168.11.2
\options \
###[ TCP ]###
sport = 54838
dport = http
seq = 0
ack = 0
dataofs = None
reserved = 0
flags = S
window = 8192
chksum = None
urgptr = 0
options = ''
2023-08-28 13:18:47,803: INFO: Sending out all flows
2023-08-28 13:18:47,854: INFO: Done sending all flows
2023-08-28 13:18:47,889: INFO: Module completed
Reveal Packet
Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: 31:05:92:3e:ff:a2 (31:05:92:3e:ff:a2)
Internet Protocol Version 4, Src: 1.1.1.1, Dst: 2.2.2.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 90
Identification: 0x0001 (1)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 145
Protocol: UDP (17)
Header Checksum: 0xe38c [validation disabled]
[Header checksum status: Unverified]
Source Address: 1.1.1.1
Destination Address: 2.2.2.2
User Datagram Protocol, Src Port: 63258, Dst Port: 4789
Virtual eXtensible Local Area Network
Flags: 0x0800, VXLAN Network ID (VNI)
Group Policy ID: 0
VXLAN Network Identifier (VNI): 2002
Reserved: 0
Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: de:ad:be:ef:ca:fe (de:ad:be:ef:ca:fe)
Internet Protocol Version 4, Src: 192.168.11.1, Dst: 192.168.11.2
Transmission Control Protocol, Src Port: 54838, Dst Port: 80, Seq: 0, Len: 0
Random packet generation
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 5
Enter the number of flows > 1
Building flow number [ 1 ]:
Packet Type:
1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP
Enter your choice (1-3) > 4
Generate random Vxlan ARP Packet? (y/n) > y
ARP Type (req/resp) > req
Count (c for continous) > 5
Source Interface > et48
2023-08-28 13:23:17,719: INFO: Inner ARP packet built
2023-08-28 13:23:17,720: INFO: VXLAN ARP packet built
###[ Ethernet ]###
dst = 68:ef:7c:2d:0c:be
src = c4:ca:2b:b1:f6:39
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags = DF
frag = 0
ttl = 186
proto = udp
chksum = None
src = 192.174.57.89
dst = 192.172.16.51
\options \
###[ UDP ]###
sport = 51906
dport = 4789
len = None
chksum = None
###[ VXLAN ]###
flags = Instance
reserved1 = 0
vni = 0xd6709
reserved2 = 0x0
###[ Ethernet ]###
dst = ff:ff:ff:ff:ff:ff
src = dd:e6:65:66:df:0c
type = ARP
###[ ARP ]###
hwtype = Ethernet (10Mb)
ptype = IPv4
hwlen = None
plen = None
op = who-has
hwsrc = dd:e6:65:66:df:0c
psrc = 172.20.96.38
hwdst = 00:00:00:00:00:00
pdst = 172.20.209.178
2023-08-28 13:23:17,721: INFO: Sending out all flows
2023-08-28 13:23:17,806: INFO: Done sending all flows
2023-08-28 13:23:17,839: INFO: Module completed
Reveal Packet
Ethernet II, Src: AristaNe_b1:f6:39 (c4:ca:2b:b1:f6:39), Dst: 68:ef:7c:2d:0c:be (68:ef:7c:2d:0c:be)
Internet Protocol Version 4, Src: 192.174.57.89, Dst: 192.172.16.51
User Datagram Protocol, Src Port: 51906, Dst Port: 4789
Virtual eXtensible Local Area Network
Flags: 0x0800, VXLAN Network ID (VNI)
Group Policy ID: 0
VXLAN Network Identifier (VNI): 878345
Reserved: 0
Ethernet II, Src: dd:e6:65:66:df:0c (dd:e6:65:66:df:0c), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Address Resolution Protocol (request)
Hardware type: Ethernet (1)
Protocol type: IPv4 (0x0800)
Hardware size: 6
Protocol size: 4
Opcode: request (1)
Sender MAC address: dd:e6:65:66:df:0c (dd:e6:65:66:df:0c)
Sender IP address: 172.20.96.38
Target MAC address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Target IP address: 172.20.209.178
Manual packet generation
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 5
Enter the number of flows > 1
Building flow number [ 1 ]:
Packet Type:
1 -- Vxlan - Inner ICMP
2 -- Vxlan - Inner UDP
3 -- Vxlan - Inner TCP
4 -- Vxlan - Inner ARP
Enter your choice (1-3) > 4
Generate random Vxlan ARP Packet? (y/n) > n
ARP Type (req/resp) > resp
Inner Source MAC (de:ad:be:ef:ca:fe) > fa:16:3e:8c:59:a3
Inner Destination MAC > fa:16:3e:38:94:9d
Inner Sender MAC > fa:16:3e:8c:59:a3
Inner Sender IP > 192.168.12.2
Inner Target MAC > fa:16:3e:38:94:9d
Inner Target IP > 192.168.12.3
Outer Source MAC (de:ad:be:af:ca:fe) > ba:ad:be:ef:ca:fe
Outer Destination MAC > de:ad:be:ef:ca:fe
Outer Source IP > 1.1.1.1
Outer Destination IP > 2.2.2.2
Outer UDP Source Port > 51906
Outer UDP Destination Port (default 4789) >
VNI > 1010
Count (c for continous) > 5
Source Interface > et48
2023-08-28 13:27:35,150: INFO: Inner ARP packet built
2023-08-28 13:27:35,150: INFO: Vxlan ARP Packet built
###[ Ethernet ]###
dst = de:ad:be:ef:ca:fe
src = ba:ad:be:ef:ca:fe
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags = DF
frag = 0
ttl = 55
proto = udp
chksum = None
src = 1.1.1.1
dst = 2.2.2.2
\options \
###[ UDP ]###
sport = 51906
dport = 4789
len = None
chksum = None
###[ VXLAN ]###
flags = Instance
reserved1 = 0
vni = 0x3f2
reserved2 = 0x0
###[ Ethernet ]###
dst = fa:16:3e:38:94:9d
src = fa:16:3e:8c:59:a3
type = ARP
###[ ARP ]###
hwtype = Ethernet (10Mb)
ptype = IPv4
hwlen = None
plen = None
op = is-at
hwsrc = fa:16:3e:8c:59:a3
psrc = 192.168.12.2
hwdst = fa:16:3e:38:94:9d
pdst = 192.168.12.3
2023-08-28 13:27:35,151: INFO: Sending out all flows
2023-08-28 13:27:35,202: INFO: Done sending all flows
2023-08-28 13:27:35,234: INFO: Module completed
Reveal Packet
Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: de:ad:be:ef:ca:fe (de:ad:be:ef:ca:fe)
Internet Protocol Version 4, Src: 1.1.1.1, Dst: 2.2.2.2
User Datagram Protocol, Src Port: 51906, Dst Port: 4789
Virtual eXtensible Local Area Network
Flags: 0x0800, VXLAN Network ID (VNI)
Group Policy ID: 0
VXLAN Network Identifier (VNI): 1010
Reserved: 0
Ethernet II, Src: fa:16:3e:8c:59:a3 (fa:16:3e:8c:59:a3), Dst: fa:16:3e:38:94:9d (fa:16:3e:38:94:9d)
Address Resolution Protocol (reply)
Hardware type: Ethernet (1)
Protocol type: IPv4 (0x0800)
Hardware size: 6
Protocol size: 4
Opcode: reply (2)
Sender MAC address: fa:16:3e:8c:59:a3 (fa:16:3e:8c:59:a3)
Sender IP address: 192.168.12.2
Target MAC address: fa:16:3e:38:94:9d (fa:16:3e:38:94:9d)
Target IP address: 192.168.12.3
This module allows users to load packets from a packet capture file on disk and then edit and replay those packets from an interface.
Provide the abosolute path to the capture file being loaded.
Currently this module supports only basic fields which can be modified:
- Source & Destination MAC
- Source & Destination IP
Edit and replay - Specific IP Flows
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 6
Path to pcap file > /mnt/flash/test-trace.pcap
2023-08-28 13:37:01,057: INFO: Pcap file loaded successfully!
Select action:
1 -- Edit and replay all packets
2 -- Edit and replay specific IP flows
3 -- Edit and replay specific non-IP flows
4 -- Replay the same pcap
Enter your choice (1-4) > 2
2023-08-28 13:37:10,170: INFO: Following unique flows found in capture...
| Index | Source | Destination | Packet Count |
|---------|--------------|---------------|----------------|
| 1 | 172.168.5.71 | 172.168.5.48 | 34 |
| 2 | 172.168.5.48 | 172.168.5.71 | 34 |
Select flows to modify and replay (all to modify all IP flows) > 1
Modify flow [ ('172.168.5.71', '172.168.5.48') ]
Source MAC (de:ad:be:ef:ca:fe) > ba:ad:be:ef:ca:fe
Destination MAC > de:ad:be:ef:ca:fe
Source IP > 192.168.14.1
Destination IP > 192.168.14.2
Count (c for continous) > 1
Source Interface > et48
2023-08-28 13:37:57,153: INFO: Packets after change...
0000 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0001 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0002 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0003 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0004 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0005 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0006 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0007 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0008 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0009 Ether / IP / ICMP 192.168.14.1 > 192.168.14.2 echo-request 0 / Raw
0010 Ether / IP / TCP 192.168.14.1:http > 192.168.14.2:49946 SA
0011 Ether / IP / TCP 192.168.14.1:http > 192.168.14.2:49946 FA
0012 Ether / IP / TCP 192.168.14.1:https > 192.168.14.2:45152 SA
0013 Ether / IP / TCP 192.168.14.1:https > 192.168.14.2:45152 FA
0014 Ether / IP / TCP 192.168.14.1:55072 > 192.168.14.2:http PA / Raw
0015 Ether / IP / TCP 192.168.14.1:55072 > 192.168.14.2:http A
0016 Ether / IP / TCP 192.168.14.1:55072 > 192.168.14.2:http A
0017 Ether / IP / TCP 192.168.14.1:55072 > 192.168.14.2:http A
0018 Ether / IP / TCP 192.168.14.1:55072 > 192.168.14.2:http FA
0019 Ether / IP / TCP 192.168.14.1:55072 > 192.168.14.2:http A
0020 Ether / IP / TCP 192.168.14.1:39668 > 192.168.14.2:https S
0021 Ether / IP / TCP 192.168.14.1:39668 > 192.168.14.2:https A
0022 Ether / IP / TCP 192.168.14.1:39668 > 192.168.14.2:https PA / Raw
0023 Ether / IP / TCP 192.168.14.1:39668 > 192.168.14.2:https A
0024 Ether / IP / TCP 192.168.14.1:39668 > 192.168.14.2:https PA / Raw
0025 Ether / IP / TCP 192.168.14.1:39668 > 192.168.14.2:https A
0026 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https S
0027 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https A
0028 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https PA / Raw
0029 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https A
0030 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https PA / Raw
0031 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https PA / Raw
0032 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https A
0033 Ether / IP / TCP 192.168.14.1:39670 > 192.168.14.2:https A
2023-08-28 13:37:57,159: INFO: Sending out modified flows...
2023-08-28 13:37:57,230: INFO: Done sending all flows
2023-08-28 13:37:57,231: INFO: Done with PCAP module
2023-08-28 13:37:57,265: INFO: Module completed
Reveal Packet
Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: de:ad:be:ef:ca:fe (de:ad:be:ef:ca:fe)
Internet Protocol Version 4, Src: 192.168.14.1, Dst: 192.168.14.2
Internet Control Message Protocol
Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: de:ad:be:ef:ca:fe (de:ad:be:ef:ca:fe)
Internet Protocol Version 4, Src: 192.168.14.1, Dst: 192.168.14.2
Transmission Control Protocol, Src Port: 80, Dst Port: 49946, Seq: 0, Ack: 1, Len: 0
<--snipped-->
Following modules support adding single or multiple 802.1Q (Dot1q) VLAN tags:
- ICMP
- ARP
- IGMP
- Multicast
All these modules also support Class of Service (CoS or COS) marking per VLAN. The field specifies a priority value between 0 and 7, more commonly known as CS0 through CS7.
Users can provide the CoS value per VLAN.
The default CoS value is 0 if no user input is provided.
ICMP - Single VLAN tag with default CoS
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 1
Enter the number of flows > 1
Building flow number [ 1 ]:
Random ICMP Packet? (y/n) > n
ICMP Type (req/reply) > reply
Source MAC (de:ad:be:ef:ca:fe) > 00:1c:58:23:64:c1
Destination MAC > 00:15:62:64:33:41
Source IP > 192.168.14.10
Destination IP > 192.168.14.20
TTL > 10
Tag (y/n) > y
VLAN Tag (x,y) > 10
CoS (x,y | default 0) >
Count (c for continous) > 5
Source Interface > et48
2023-09-05 10:53:00,832: INFO: ICMP Packet built
###[ Ethernet ]###
dst = 00:15:62:64:33:41
src = 00:1c:58:23:64:c1
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 10
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 10
proto = icmp
chksum = None
src = 192.168.14.10
dst = 192.168.14.20
\options \
###[ ICMP ]###
type = echo-reply
code = 0
chksum = None
id = 0x294
seq = 0x0
unused = ''
###[ Raw ]###
load = ' \\x81ll\\xa6\\xe5\x15\\xc0\\xe6c\\xa2\\xa4K\\xb4\\xacWm\\x85$\\xaaV\\xfe\x190K\\xb7ߺ\\xf5\x16\x10\\xab\\xf9\\x94\\x84<\\x9c9\\xacm6\\xd0p\x10\\Q\x18\\xd7q̨\\xf9}\\xb4i\x02\\xb3\x19\\xf8S\\xdfjS'
2023-09-05 10:53:00,833: INFO: Sending out all flows
2023-09-05 10:53:00,886: INFO: Done sending all flows
2023-09-05 10:53:00,920: INFO: Module completed
Reveal Packet
Ethernet II, Src: Cisco_23:64:c1 (00:1c:58:23:64:c1), Dst: Cisco_64:33:41 (00:15:62:64:33:41)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 10
000. .... .... .... = Priority: Best Effort (default) (0)
...0 .... .... .... = DEI: Ineligible
.... 0000 0000 1010 = ID: 10
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.14.10, Dst: 192.168.14.20
Internet Control Message Protocol
ICMP - Double VLAN tag with default CoS
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 1
Enter the number of flows > 1
Building flow number [ 1 ]:
Random ICMP Packet? (y/n) > n
ICMP Type (req/reply) > reply
Source MAC (de:ad:be:ef:ca:fe) > 00:1c:58:23:64:c1
Destination MAC > 00:15:62:64:33:41
Source IP > 192.168.14.10
Destination IP > 192.168.14.20
TTL > 10
Tag (y/n) > y
VLAN Tag (x,y) > 10,20
CoS (x,y | default 0) >
Count (c for continous) > 5
Source Interface > et48
2023-09-05 11:03:43,324: INFO: ICMP Packet built
###[ Ethernet ]###
dst = 00:15:62:64:33:41
src = 00:1c:58:23:64:c1
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 10
type = n_802_1Q
###[ 802.1Q ]###
prio = 0
id = 0
vlan = 20
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 10
proto = icmp
chksum = None
src = 192.168.14.10
dst = 192.168.14.20
\options \
###[ ICMP ]###
type = echo-reply
code = 0
chksum = None
id = 0x580
seq = 0x0
unused = ''
###[ Raw ]###
load = '#\\xda\x03\\xe1h\\x99\\xecj\\xed\x0b\\xa0D\\xf4\\xc7W唨\\x86\x15\x1b\\xae\x12\\xa2L~\\xe1\\xb5p\\xe8\\xa5L3\\xc0d\\xe0\x11\\xbc?\\xaaH\x10\\xf2K\\xbc\x11\x06\\xf1\\x99\\xa5[\\xbe\x01\x17Q\\xab(,\\xc4n\\xeb\\xe1\\xa2\\xf0'
2023-09-05 11:03:43,326: INFO: Sending out all flows
2023-09-05 11:03:43,382: INFO: Done sending all flows
2023-09-05 11:03:43,415: INFO: Module completed
Reveal Packet
Ethernet II, Src: Cisco_23:64:c1 (00:1c:58:23:64:c1), Dst: Cisco_64:33:41 (00:15:62:64:33:41)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 10
000. .... .... .... = Priority: Best Effort (default) (0)
...0 .... .... .... = DEI: Ineligible
.... 0000 0000 1010 = ID: 10
Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 0, DEI: 0, ID: 20
000. .... .... .... = Priority: Best Effort (default) (0)
...0 .... .... .... = DEI: Ineligible
.... 0000 0001 0100 = ID: 20
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.14.10, Dst: 192.168.14.20
Internet Control Message Protocol
ICMP - Double VLAN tag with User defined CoS
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Load PCAP File
7 -- Exit
Enter your choice (1-7): 1
Enter the number of flows > 1
Building flow number [ 1 ]:
Random ICMP Packet? (y/n) > n
ICMP Type (req/reply) > reply
Source MAC (de:ad:be:ef:ca:fe) > 00:1c:58:23:64:c1
Destination MAC > 00:15:62:64:33:41
Source IP > 192.168.14.10
Destination IP > 192.168.14.20
TTL > 20
Tag (y/n) > y
VLAN Tag (x,y) > 20,30
CoS (x,y | default 0) > 5,6
Count (c for continous) > 5
Source Interface > et48
2023-09-05 11:07:20,219: INFO: ICMP Packet built
###[ Ethernet ]###
dst = 00:15:62:64:33:41
src = 00:1c:58:23:64:c1
type = n_802_1Q
###[ 802.1Q ]###
prio = 5
id = 0
vlan = 20
type = n_802_1Q
###[ 802.1Q ]###
prio = 6
id = 0
vlan = 30
type = IPv4
###[ IP ]###
version = 4
ihl = None
tos = 0x0
len = None
id = 1
flags =
frag = 0
ttl = 20
proto = icmp
chksum = None
src = 192.168.14.10
dst = 192.168.14.20
\options \
###[ ICMP ]###
type = echo-reply
code = 0
chksum = None
id = 0x1f7
seq = 0x0
unused = ''
###[ Raw ]###
load = 'ѷ\x15\\xf0\x16>0xyks\\xf0\x167\\xdd9\x0c\\xb2\\xf9*\x04\\xd3q\\xaf6#\\xf9L\\xad\\xbda\x0e&1\x1f?\\x9a\x01\x13"\x7f\\x88\x08S\x05\\xf98\\xd0c\n@i|}\\xc1\\xa5\\xb9\\xcbp\\xbd\x04\\xc4\\xec\\xa7'
2023-09-05 11:07:20,221: INFO: Sending out all flows
2023-09-05 11:07:20,286: INFO: Done sending all flows
2023-09-05 11:07:20,321: INFO: Module completed
Reveal Packet
Ethernet II, Src: Cisco_23:64:c1 (00:1c:58:23:64:c1), Dst: Cisco_64:33:41 (00:15:62:64:33:41)
802.1Q Virtual LAN, PRI: 5, DEI: 0, ID: 20
101. .... .... .... = Priority: Voice, < 10ms latency and jitter (5)
...0 .... .... .... = DEI: Ineligible
.... 0000 0001 0100 = ID: 20
Type: 802.1Q Virtual LAN (0x8100)
802.1Q Virtual LAN, PRI: 6, DEI: 0, ID: 30
110. .... .... .... = Priority: Internetwork Control (6)
...0 .... .... .... = DEI: Ineligible
.... 0000 0001 1110 = ID: 30
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.14.10, Dst: 192.168.14.20
Internet Control Message Protocol
This module allows users to craft and send Ethernet Pause Frames (802.3x). The destination MAC is the 48-bit reserved multicast address of 01:80:C2:00:00:01
The Pause time can be specified by user. The pause time is measured in units of pause quanta
, where each quanta is equal to 512 bit times. The range is from 0 to 65535. A pause frame with a pause quanta of 0 indicates a resume frame to restart the paused traffic.
Random Pause Frame generation
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Pause Frame
7 -- Priority Flow Control
8 -- Load PCAP File
9 -- Exit
Enter your choice (1-9): 6
Enter the number of flows > 1
Building flow number [ 1 ]:
Random 802.3x Pause Frame? (y/n) > y
Count (c for continous) > 5
Source Interface > et4
2023-10-13 13:00:20,368: INFO: 802.3x Pause Frame built
###[ Ethernet ]###
dst = 01:80:c2:00:00:01
src = 20:65:cb:58:5c:ea
type = 0x8808
###[ MACControlPause ]###
_op_code = 1
pause_time= 7448
2023-10-13 13:00:20,369: INFO: Sending out all flows
2023-10-13 13:00:20,430: INFO: Done sending all flows
2023-10-13 13:00:20,472: INFO: Module completed
Reveal Packet
Ethernet II, Src: 20:65:cb:58:5c:ea (20:65:cb:58:5c:ea), Dst: MAC-specific-ctrl-proto-01 (01:80:c2:00:00:01)
Destination: MAC-specific-ctrl-proto-01 (01:80:c2:00:00:01)
Source: 20:65:cb:58:5c:ea (20:65:cb:58:5c:ea)
Type: MAC Control (0x8808)
MAC Control
Opcode: Pause (0x0001)
pause_time: 7448
Manual Pause Frame with Time in Quanta 4660
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Pause Frame
7 -- Priority Flow Control
8 -- Load PCAP File
9 -- Exit
Enter your choice (1-9): 6
Enter the number of flows > 1
Building flow number [ 1 ]:
Random 802.3x Pause Frame? (y/n) > n
Source MAC (de:ad:be:ef:ca:fe) > ba:ad:be:ef:ca:fe
Time in Quanta (0-65535) > 4660
Count (c for continous) > 5
Source Interface > et4
2023-10-13 13:05:15,487: INFO: 802.3x Pause Frame built
###[ Ethernet ]###
dst = 01:80:c2:00:00:01
src = ba:ad:be:ef:ca:fe
type = 0x8808
###[ MACControlPause ]###
_op_code = 1
pause_time= 4660
2023-10-13 13:05:15,488: INFO: Sending out all flows
2023-10-13 13:05:15,550: INFO: Done sending all flows
2023-10-13 13:05:15,593: INFO: Module completed
Reveal Packet
Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: MAC-specific-ctrl-proto-01 (01:80:c2:00:00:01)
Destination: MAC-specific-ctrl-proto-01 (01:80:c2:00:00:01)
Source: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe)
Type: MAC Control (0x8808)
MAC Control
Opcode: Pause (0x0001)
pause_time: 4660
This module allows users to craft and send Priority Flow Control (802.1Qbb) frames. The destination MAC is the 48-bit reserved multicast address of 01:80:C2:00:00:01
The Pause time can be specified by user. The pause time is measured in units of pause quanta
, where each quanta is equal to 512 bit times. The range is from 0 to 65535. A pause frame with a pause quanta of 0 indicates a resume frame to restart the paused traffic.
In PFC pause time in quanta can be specified for each of eight priority classes separately.
By default generated PFC, will have all Classes disabled with Quanta value set to zero (0). User can provide input which class to enable and the Quanta value for the respective class.
Random PFC generation
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Pause Frame
7 -- Priority Flow Control
8 -- Load PCAP File
9 -- Exit
Enter your choice (1-9): 7
Enter the number of flows > 1
Building flow number [ 1 ]:
Random 802.1Qbb PFC Frame? (y/n) > y
Count (c for continous) > 5
Source Interface > et4
2023-10-13 13:13:20,154: INFO: 802.1Qbb PFC Frame built
###[ Ethernet ]###
dst = 01:80:c2:00:00:01
src = 28:fe:65:ff:28:23
type = 0x8808
###[ Raw ]###
load = '\x01\x01\x00H\x00\x00\x00\x00\x00\x00@6\x00\x00\x00\x00u\\x97\x00\x00'
###[ Padding ]###
load = '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
2023-10-13 13:13:20,154: INFO: Sending out all flows
2023-10-13 13:13:20,214: INFO: Done sending all flows
2023-10-13 13:13:20,257: INFO: Module completed
Reveal Packet
Ethernet II, Src: DongGuan_ff:28:23 (28:fe:65:ff:28:23), Dst: MAC-specific-ctrl-proto-01 (01:80:c2:00:00:01)
Destination: MAC-specific-ctrl-proto-01 (01:80:c2:00:00:01)
Source: DongGuan_ff:28:23 (28:fe:65:ff:28:23)
Type: MAC Control (0x8808)
MAC Control
Opcode: Class Based Flow Control [CBFC] Pause (0x0101)
CBFC Class Enable Vector: 0x0048, C3, C6
.... .... .... ...0 = C0: False
.... .... .... ..0. = C1: False
.... .... .... .0.. = C2: False
.... .... .... 1... = C3: True
.... .... ...0 .... = C4: False
.... .... ..0. .... = C5: False
.... .... .1.. .... = C6: True
.... .... 0... .... = C7: False
CBFC Class Pause Times
C0: 0
C1: 0
C2: 0
C3: 16438
C4: 0
C5: 0
C6: 30103
C7: 0
Manual PFC with default Class and Quanta values
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Pause Frame
7 -- Priority Flow Control
8 -- Load PCAP File
9 -- Exit
Enter your choice (1-9): 7
Enter the number of flows > 1
Building flow number [ 1 ]:
Random 802.1Qbb PFC Frame? (y/n) > n
Source MAC (de:ad:be:ef:ca:fe) > ba:ad:be:ef:ca:fe
Enable Pause for Class (C0-C7) >
Time in Quanta for Class (0-65535) >
Count (c for continous) > 5
Source Interface > et4
2023-10-13 13:15:14,373: INFO: 802.1Qbb PFC Frame built
###[ Ethernet ]###
dst = 01:80:c2:00:00:01
src = ba:ad:be:ef:ca:fe
type = 0x8808
###[ Raw ]###
load = '\x01\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
###[ Padding ]###
load = '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
2023-10-13 13:15:14,374: INFO: Sending out all flows
2023-10-13 13:15:14,434: INFO: Done sending all flows
2023-10-13 13:15:14,477: INFO: Module completed
Reveal Packet
Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: MAC-specific-ctrl-proto-01 (01:80:c2:00:00:01)
Destination: MAC-specific-ctrl-proto-01 (01:80:c2:00:00:01)
Source: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe)
Type: MAC Control (0x8808)
MAC Control
Opcode: Class Based Flow Control [CBFC] Pause (0x0101)
CBFC Class Enable Vector: 0x0000
.... .... .... ...0 = C0: False
.... .... .... ..0. = C1: False
.... .... .... .0.. = C2: False
.... .... .... 0... = C3: False
.... .... ...0 .... = C4: False
.... .... ..0. .... = C5: False
.... .... .0.. .... = C6: False
.... .... 0... .... = C7: False
CBFC Class Pause Times
C0: 0
C1: 0
C2: 0
C3: 0
C4: 0
C5: 0
C6: 0
C7: 0
Manual PFC with Priority Flow Control Enabled for Class 1, 3, 5 and 7
Reveal Output
==================================================
Scapy based packet generator
==================================================
1 -- ICMP
2 -- ARP
3 -- IGMP
4 -- Multicast
5 -- VXLAN
6 -- Pause Frame
7 -- Priority Flow Control
8 -- Load PCAP File
9 -- Exit
Enter your choice (1-9): 7
Enter the number of flows > 1
Building flow number [ 1 ]:
Random 802.1Qbb PFC Frame? (y/n) > n
Source MAC (de:ad:be:ef:ca:fe) > ba:ad:be:ef:ca:fe
Enable Pause for Class (C0-C7) > C1,C3,C5,C7
Time in Quanta for Class (0-65535) > 100,4660,65535,0
Count (c for continous) > 5
Source Interface > et4
2023-10-13 13:18:14,575: INFO: 802.1Qbb PFC Frame built
###[ Ethernet ]###
dst = 01:80:c2:00:00:01
src = ba:ad:be:ef:ca:fe
type = 0x8808
###[ Raw ]###
load = '\x01\x01\x00\\xaa\x00\x00\x00d\x00\x00\x124\x00\x00\\xff\\xff\x00\x00\x00\x00'
###[ Padding ]###
load = '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
2023-10-13 13:18:14,576: INFO: Sending out all flows
2023-10-13 13:18:14,634: INFO: Done sending all flows
2023-10-13 13:18:14,676: INFO: Module completed
Reveal Packet
Ethernet II, Src: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe), Dst: MAC-specific-ctrl-proto-01 (01:80:c2:00:00:01)
Destination: MAC-specific-ctrl-proto-01 (01:80:c2:00:00:01)
Source: ba:ad:be:ef:ca:fe (ba:ad:be:ef:ca:fe)
Type: MAC Control (0x8808)
MAC Control
Opcode: Class Based Flow Control [CBFC] Pause (0x0101)
CBFC Class Enable Vector: 0x00aa, C1, C3, C5, C7
.... .... .... ...0 = C0: False
.... .... .... ..1. = C1: True
.... .... .... .0.. = C2: False
.... .... .... 1... = C3: True
.... .... ...0 .... = C4: False
.... .... ..1. .... = C5: True
.... .... .0.. .... = C6: False
.... .... 1... .... = C7: True
CBFC Class Pause Times
C0: 0
C1: 100
C2: 0
C3: 4660
C4: 0
C5: 65535
C6: 0
C7: 0