Call the sr...() functions with parameter promisc=1 for that. This
is needed for the src/sys/netinet/arp regress test and was backported
from secdev/scapy master at github.
OK danj@ (maintainer)
2.3.3 update. Sniff the packets in sndrcv() like it is done on
FreeBSD and Darwin. Without this patch, everything worked with
virtual qemu. But on real ethernet hardware sr() sends TCP packets
to the broadcast MAC address as scapy did not see the ARP reply to
figure out the correct MAC address.
OK danj@ (maintainer)
Laurent Ghigonis, one to properly detect the mac address and the other to close
the bpf after use (You don't need to create 40 bpf anymore), thanks !
ok sthen@
help from me. The IPv6 features provided by scapy6 are integrated (still
some problems with them, but working well enough) so pkgpath/conflict
markers are set to replace an existing scapy6 installation.
ok wcmaier@ "if it works go for it" claudio@
Scapy is a powerful interactive packet manipulation program. It is
able to forge or decode packets of a wide number of protocols, send
them on the wire, capture them, match requests and replies, and much
more. It can easily handle most classical tasks like scanning,
tracerouting, probing, unit tests, attacks or network discovery (it
can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump,
tethereal, p0f, etc.). It also performs very well at a lot of other
specific tasks that most other tools can't handle, like sending
invalid frames, injecting your own 802.11 frames, combining technics
(VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted
channel, ...), etc.
from uwe@