PackETH
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Hello. My name is Dustin, and welcome to pen test basics scanning networks.
00:05
Pai Keith is very similar to H. Ping, although it's primarily used with it's gooey. It does have a command line option as well.
00:14
With Paki, you can create and send pretty much any possible packet or sequence of packets on the Ethernet link. I would definitely recommend Paki if you'd like to get a little more familiar with crafting packets
00:31
because it has a gooey it's really ah, lot easier to use than H ping until you get used to it. Um, it's also really easy to install an available on linens and Windows operating systems, so to install it on Windows, it's really easy. You just download the package from source Forge,
00:51
extract, zip
00:52
and run the installer. It does require wimpy cap on a Windows machine, of course, so that it's just another download and run that and seller and you'll be good to go.
01:04
So because Paki is such a powerful tool, it really could take its own course in this demo. I'm just gonna go over real quick walkthrough on how you install it on windows, and I'll kind of go over the gooey interface and show you a couple of things. Maybe some common features
01:25
on Ben How to save
01:26
you're configurations as well.
01:30
So let's go ahead and we will talk in our lab.
01:37
Okay, So as you can see, I downloaded the pah Keith off zip file. I went ahead and extracted that, and that came out right here. And then I did have to install show you real quick
01:51
what it load.
01:55
Just win pea cap. And that's just, ah, file for Windows that allows you to capture and uspi caps so you can just download that
02:05
run the in solid, pretty self explanatory there.
02:07
So we've got that installed. So let's go ahead and open our Paki folder.
02:12
Open that one
02:15
and this one. Like I said, it's super easy to use.
02:17
Here it is. Just pack keith dot e x c c May need to scroll down there Enough about border. So pretty easy to find.
02:24
Just double click it.
02:29
There you go. You can see we've already got it installed and opens was really easy to do, and this is kind of how you will craft packets, so it is really simple. But let's take a look here,
02:44
and we'll kind of just go through. Ah, couple of different things that you can do with it. So if we just start on the top here we are in the builder tab. That is where you will build all of your packets. Um, the peak cap tab is where you can kind of capture P caps and
03:04
do different things with them. Manipulate those, load them,
03:07
um, or analyze them. So that's all there. But so say you you've generated a packet and you works for you, depending on what purposes. But it really works in your your network, your environment. You can actually just do save or even set it as the default
03:27
so that when you don't have to manually generate that packet
03:30
each time.
03:35
So if we kind of go through here, this is where you can select a CZ. You could see the Mac header destination or sores, Stevens. That your own source. I I'm sorry, header. And then the next layer you can choose for I p r or specific payload. If you've already got that, you can send in our pack it and if you notice
03:53
it changes to the art options.
03:57
These are defined payload changes to those options, but typically you'll be in that I p b four.
04:03
This is where you can modify pretty much anything on the packet. You can modify the header length the version. You can select different flags so you can set it to don't fragment or maybe more fragments.
04:18
That's where you set your offset your timeto live
04:23
and then your your source. I p. Destination I p and again, then the next layer. And depending on what you want to do, you can change from UDP, TCP ICMP or even I GMP.
04:36
And so this. Like I said, it really depends on what she wanted to do what you're trying to accomplish with this. But this is a good way to
04:45
send specific packets to bypass firewalls or possibly crash software. If you like, there's there's a lot of things you can do with it, and it does make it a little easier to use. But once you get familiar with some of the options, you can go back to
05:02
each paying and go through the command light. It's got all the same stuff. This has just got the nice and gooey with that
Up Next
Instructed By
Similar Content