-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Accept Scapy Packets as offline inputs #2101
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
395a742 to
6969893
Compare
121e030 to
e421169
Compare
Codecov Report
@@ Coverage Diff @@
## master #2101 +/- ##
==========================================
- Coverage 87.18% 86.47% -0.71%
==========================================
Files 197 197
Lines 44486 44495 +9
==========================================
- Hits 38787 38479 -308
- Misses 5699 6016 +317
|
e421169 to
fb037a0
Compare
|
@gpotter2 ready to be reviewed and merged. |
scapy/sendrecv.py
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wonder if we don't want to use scapy.utils.get_temp_file(autoext=".pcap") instead
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You are right!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A small comment, otherwise good to go
fb037a0 to
5385885
Compare
5385885 to
59f2fb1
Compare
This PR fixes #1929.
The original
sniff()was not supposed to work this way. However, I find it quite useful to be able to build packets with Scapy and filter them withtcpdump. This a great way to test BPF filters.I am no 100% happy with the current implementation but it seems to work fine.