scapy.supersocket module

SuperSocket.

class scapy.supersocket.L2ListenTcpdump(iface=None, promisc=None, filter=None, nofilter=False, prog=None, *arg, **karg)

Bases: scapy.supersocket.SuperSocket

close()
desc = 'read packets at layer 2 using tcpdump'
recv(x=65535)
class scapy.supersocket.L3RawSocket(type=2048, filter=None, iface=None, promisc=None, nofilter=0)

Bases: scapy.supersocket.SuperSocket

desc = 'Layer 3 using Raw sockets (PF_INET/SOCK_RAW)'
recv(x=65535)
send(x)
class scapy.supersocket.SSLStreamSocket(sock, basecls=None)

Bases: scapy.supersocket.StreamSocket

desc = 'similar usage than StreamSocket but specialized for handling SSL-wrapped sockets'
recv(x=65535)
class scapy.supersocket.SimpleSocket(sock)

Bases: scapy.supersocket.SuperSocket

desc = 'wrapper around a classic socket'
class scapy.supersocket.StreamSocket(sock, basecls=None)

Bases: scapy.supersocket.SimpleSocket

desc = 'transforms a stream socket into a layer 2'
nonblocking_socket = True
recv(x=65535)
class scapy.supersocket.SuperSocket

Bases: object

close()
closed = 0
desc = None
fileno()
nonblocking_socket = False
read_allowed_exceptions = ()
recv(x=65535)
recv_raw(x=65535)

Returns a tuple containing (cls, pkt_data, time)

static select(sockets, remain=0.05)

This function is called during sendrecv() routine to select the available sockets.

Parameters:sockets – an array of sockets that need to be selected
Returns:an array of sockets that were selected and the function to be called next to get the packets (i.g. recv)
send(x)
sniff(*args, **kargs)
sr(*args, **kargs)
sr1(*args, **kargs)
tshark(*args, **kargs)
class scapy.supersocket.TunTapInterface(iface=None, mode_tun=None, *arg, **karg)

Bases: scapy.supersocket.SuperSocket

A socket to act as the host’s peer of a tun / tap interface.

desc = "Act as the host's peer of a tun / tap interface"
open()

Open the TUN or TAP device.

recv(x=65535)
send(x)