Tool Documentation:
hexinject Usage Example
Start in sniffing mode (-s
) through the eth0 interface (-i eth0
):
root@kali:~# hexinject -s -i eth0
FF FF FF FF FF FF 40 6C 8F 1B CB 90 08 00 45 00 00 31 E4 36 00 00 40 11 11 4E C0 A8 01 E8 C0 A8 01 FF D3 C6 7E 9C 00 1D B1 DA 4D 2D 53 45 41 52 43 48 20 2A 20 48 54 54 50 2F 31 2E 31 0D 0A
FF FF FF FF FF FF 40 6C 8F 1B CB 90 08 00 45 00 00 31 A1 63 00 00 40 11 54 21 C0 A8 01 E8 C0 A8 01 FF FF 69 7E 9E 00 1D 86 35 4D 2D 53 45 41 52 43 48 20 2A 20 48 54 54 50 2F 31 2E 31 0D 0A
FF FF FF FF FF FF 7C C3 A1 A4 B4 70 08 00 45 00 00 31 BF 94 00 00 40 11 35 FC C0 A8 01 DC C0 A8 01 FF E3 ED 7E 9C 00 1D A1 BF 4D 2D 53 45 41 52 43 48 20 2A 20 48 54 54 50 2F 31 2E 31 0D 0A
FF FF FF FF FF FF 7C C3 A1 A4 B4 70 08 00 45 00 00 31 2F DE 00 00 40 11 C5 B2 C0 A8 01 DC C0 A8 01 FF C5 16 7E 9E 00 1D C0 94 4D 2D 53 45 41 52 43 48 20 2A 20 48 54 54 50 2F 31 2E 31 0D 0A
prettypacket Usage Example
Print an example of a UDP packet (-x udp
):
root@kali:~# prettypacket -x udp
Ethernet Header:
1C AF F7 6B 0E 4D Destination hardware address
AA 00 04 00 0A 04 Source hardware address
08 00 Lenght/Type
IP Header:
45 Version / Header length
00 ToS / DFS
00 3C Total length
9B 23 ID
00 00 Flags / Fragment offset
40 TTL
11 Protocol
70 BC Checksum
C0 A8 01 09 Source address
D0 43 DC DC Destination address
UDP Header:
91 02 Source port
00 35 Destination port
00 28 Length
6F 0B Checksum
Payload or Trailer:
AE 9C 01 00 00 01 00 00 00 00 00 00 03 77 77 77 06 67 6F 6F 67 6C 65 03 63 6F
6D 00 00 01 00 01
hex2raw Usage Example
root@kali:~# hex2raw
FF 40 6C 8F 1B CB 90 08 00 45 00 00 31 E4 36 00 00 40 11 11 4E C0 A8 01 E8 C0 A8 01 FF D3 C6 7E 9C 00 1D B1 DA 4D 2D 53 45 41 52 43 48 20 2A 20 48 54 54 50 2F 31 2E 31 0D 0A
FF FF FF FF FF FF 40 6C 8F 1B CB 90 08 00 45 00 00 31 A1 63 00 00 40 11 54 21 C0 A8 01 E8 C0 A8 01 FF FF 69 7E 9E 00 1D 86 35 4D 2D 53 45 41 52 43 48 20 2A 20 48 54 54 50 2F 31 2E 31 0D 0A
������@lE1�c@T!�������i~��5M-SEARCH * HTTP/1.1
packets.tcl Usage Example
root@kali:~# packets.tcl 'ethernet(dst=ff:ff:ff:ff:ee:ee,src=aa:aa:ee:ff:ff:ff,type=0x0800)+ip(ihl=5,ver=4,tos=0xc0,totlen=58,id=62912,fragoff=0,mf=0,df=0,rf=0,ttl=64,proto=1,cksum=0xe500,saddr=192.168.1.7,daddr=192.168.1.6)+icmp(type=3,code=3,unused=0)+data(str=aaaa)+udp(sport=33169,dport=10,len=10,cksum=0x94d6)+data(str=aaaa)+arp(htype=ethernet,ptype=ip,hsize=6,psize=4,op=request,shard=00:11:22:33:44:55,sproto=192.168.1.1,thard=22:22:22:22:22:22,tproto=10.0.0.1)' > packet-out
Packages and Binaries:
hexinject
HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.
It’s designed to work together with others command-line utilities, and for this reason it facilitates the creation of powerful shell scripts capable of reading, intercepting and modifying network traffic in a transparent manner.
Installed size: 99 KB
How to install: sudo apt install hexinject
Dependencies:
- libc6
- libpcap0.8
- tcl
hex2raw
root@kali:~# hex2raw -h
Hex2Raw 1.6 [convert hexstrings on stdin to raw data on stdout]
written by: Emanuele Acri <[email protected]>
Usage:
hex2raw [-r|-h]
Options:
-r reverse mode (raw to hexstring)
-h this help screen
hexinject
root@kali:~# hexinject --help
hexinject: invalid option -- '-'
HexInject 1.6 [hexadecimal packet injector/sniffer]
written by: Emanuele Acri <[email protected]>
Usage:
hexinject <mode> <options>
Options:
-s sniff mode
-p inject mode
-r raw mode (instead of the default hexadecimal mode)
-f <filter> custom pcap filter
-i <device> network device to use
-F <file> pcap file to use as device (sniff mode only)
-c <count> number of packets to capture
-t <time> sleep time in microseconds (default 100)
-I list all available network devices
Injection options:
-C disable automatic packet checksum
-S disable automatic packet size fields
Interface options:
-P disable promiscuous mode
-M put the wireless interface in monitor mode
(experimental: use airmon-ng instead of this...)
Other options:
-h help screen
packets.tcl
root@kali:~# packets.tcl -h
Packets.tcl -- Generates binary packets specified using an
APD-like data format: http://wiki.hping.org/26
usage:
packets.tcl 'APD packet description'
example packets:
ethernet(dst=ff:ff:ff:ff:ee:ee,src=aa:aa:ee:ff:ff:ff,type=0x0800)+ip(ihl=5,ver=4,tos=0xc0,totlen=58,id=62912,fragoff=0,mf=0,df=0,rf=0,ttl=64,proto=1,cksum=0xe500,saddr=192.168.1.7,daddr=192.168.1.6)+icmp(type=3,code=3,unused=0)+data(str=aaaa)+udp(sport=33169,dport=10,len=10,cksum=0x94d6)+data(str=aaaa)+arp(htype=ethernet,ptype=ip,hsize=6,psize=4,op=request,shard=00:11:22:33:44:55,sproto=192.168.1.1,thard=22:22:22:22:22:22,tproto=10.0.0.1)
ethernet(dst=ff:ff:ff:ff:ff:ff,src=ff:ff:ff:ff:ff:ff,type=0x0800)+ip(ihl=5,ver=4,tos=00,totlen=30,id=60976,fragoff=0,mf=0,df=1,rf=0,ttl=64,proto=tcp,cksum=0x40c9,saddr=192.168.1.9,daddr=173.194.44.95)+tcp(sport=32857,dport=80,seq=1804471615,ack=0,ns=0,off=5,flags=s,win=62694,cksum=0xda46,urp=0)
ethernet(dst=ff:ff:ff:ff:ff:ff,src=ff:ff:ff:ff:ff:ff,type=0x0800)+ip(ihl=5,ver=4,tos=00,totlen=30,id=60976,fragoff=0,mf=0,df=1,rf=0,ttl=64,proto=tcp,cksum=0x40c9,saddr=192.168.1.9,daddr=173.194.44.95)+tcp(sport=32857,dport=80,seq=1804471615,ack=0,ns=0,off=8,flags=s,win=62694,cksum=0xda46,urp=0)+tcp.nop()+tcp.nop()+tcp.timestamp(val=54111314,ecr=1049055856)+data(str=f0a)
prettypacket
root@kali:~# prettypacket -h
PrettyPacket 1.6 [disassembler for raw network packets]
written by: Emanuele Acri <[email protected]>
Usage:
prettypacket [-x|-d|-h]
Options:
-x <type> print example packet, to see its structure
-d <type> dump example packet as hexstring
(types: tcp, udp, icmp, igmp, arp, stp,
ipv6_tcp, ipv6_icmp, ipv6_in_ipv4)
-h this help screen
Updated on: 2024-Mar-11