1#!/usr/local/bin/python2.7 2# send 2 non-overlapping ping6 fragments 3 4# |--------| 5# |----| 6 7import os 8from addr import * 9from scapy.all import * 10 11pid=os.getpid() 12payload="ABCDEFGHIJKLMNOP" 13packet=IPv6(src=SRC_OUT6, dst=DST_IN6)/ICMPv6EchoRequest(id=pid, data=payload) 14frag=[] 15frag.append(IPv6ExtHdrFragment(nh=58, id=pid, m=1)/str(packet)[40:56]) 16frag.append(IPv6ExtHdrFragment(nh=58, id=pid, offset=2)/str(packet)[56:64]) 17eth=[] 18for f in frag: 19 pkt=IPv6(src=SRC_OUT6, dst=DST_IN6)/f 20 eth.append(Ether(src=SRC_MAC, dst=DST_MAC)/pkt) 21 22if os.fork() == 0: 23 time.sleep(1) 24 sendp(eth, iface=SRC_IF) 25 os._exit(0) 26 27ans=sniff(iface=SRC_IF, timeout=3, filter= 28 "ip6 and src "+DST_IN6+" and dst "+SRC_OUT6+" and icmp6") 29for a in ans: 30 if a and a.type == ETH_P_IPV6 and \ 31 ipv6nh[a.payload.nh] == 'ICMPv6' and \ 32 icmp6types[a.payload.payload.type] == 'Echo Reply': 33 id=a.payload.payload.id 34 print "id=%#x" % (id) 35 if id != pid: 36 print "WRONG ECHO REPLY ID" 37 exit(2) 38 data=a.payload.payload.data 39 print "payload=%s" % (data) 40 if data == payload: 41 exit(0) 42 print "PAYLOAD!=%s" % (payload) 43 exit(1) 44print "NO ECHO REPLY" 45exit(2) 46