Scapy with Guillaume Valadon

The Python Podcast.__init__

Episode | Podcast

Date: Sat, 29 Apr 2017 11:00:00 -0400

<h3>Summary</h3> <p>Network protocols are often inscrutable, but if you have an effective way to experiment with them then they expose a lot of power. This week Guillaume Valadon explains how Scapy can be used to inspect your network traffic, test the security of your systems, and develop brand new protocols, all in Python!</p> <h3>Preface</h3> <ul> <li>Hello and welcome to Podcast.&#95;&#95;init&#95;&#95;, the podcast about Python and the people who make it great.</li> <li>I would like to thank everyone who supports us on <a href="https://www.pythonpodcast.com/podcastinit?utm_source=rss&amp;utm_medium=rss">Patreon</a>. Your contributions help to make the show sustainable.</li> <li>When you&#8217;re ready to launch your next project you&#8217;ll need somewhere to deploy it. Check out Linode at <a href="https://www.pythonpodcast.com/linode?utm_source=rss&amp;utm_medium=rss">www.podastinit.com/linode?utm_source=rss&amp;utm_medium=rss</a> and get a $20 credit to try out their fast and reliable Linux virtual servers for running your awesome app.</li> <li>Visit the <a href="https://www.pythonpodcast.com?utm_source=rss&amp;utm_medium=rss">site</a> to subscribe to the show, sign up for the newsletter, read the show notes, and get in touch.</li> <li>To help other people find the show please leave a review on <a href="https://itunes.apple.com/us/podcast/podcast.-init/id981834425?mt=2&amp;uo=6&amp;at=&amp;ct=&amp;utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">iTunes</a>, or <a href="https://play.google.com/music/m/I7ogju4xv6adasgqz6545jndgsy?t=Podcastinit_-_Python_and_the_people_who_make_it_great&amp;utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">Google Play Music</a>, tell your friends and co-workers, and share it on social media.</li> <li>Get a shirt and support the show! Go to https://teespring.com/podcastinit?utm_source=rss&amp;utm_medium=rss and get a mug to go with it.</li> <li>Your host as usual is Tobias Macey and today I am interviewing Guillaume Valadon about Scapy, the swiss army knife for packet manipulation in Python</li> </ul> <h3>Interview</h3> <ul> <li>Introductions</li> <li>How did you get introduced to Python?</li> <li>Can you explain what Scapy is and what problem it was created to solve?</li> <li>How has the decision to build Scapy in Python benefited the project?</li> <li>How has the 10 year history of the project affected your ability to maintain and evolve the code?</li> <li>How has the project evolved from the initial prototypes by Philippe Biondi through to its current incarnation as Scapy 2?</li> <li>I understand that the project was originally hosted on Bitbucket and then moved to Github. What prompted that decision and how has it played out?</li> <li>Who is the target audience and what are some of the primary intended use cases for Scapy?</li> <li>How is the implementation of packet layering architected in order to allow for such flexibility and composability?</li> <li>What are some of the most interesting and unexpected ways that you have seen Scapy used?</li> <li>What protocols have been the most problematic to implement and maintain?</li> <li>What have been some of the most challenging aspects of developing Scapy?</li> <li>What do you have planned for the future of Scapy?</li> </ul> <h3>Contact Info</h3> <ul> <li>Guillaume <ul> <li><a href="http://guillaume.valadon.net/research/index.html?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">Website</a></li> <li><a href="https://feeds.fireside.fm/pythonpodcast/guillaume.valadon@lip6.fr">Email</a></li> <li><a href="https://twitter.com/guedou?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">@guedou</a> on Twitter</li> </ul> </li> </ul> <h3>Picks</h3> <ul> <li>Tobias <ul> <li><a href="https://en.wikipedia.org/wiki/Buckethead?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">Buckethead</a></li> </ul> </li> <li>Guillaume <ul> <li><a href="https://www.rust-lang.org/en-US/?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">Rust</a></li> </ul> </li> </ul> <h3>Links</h3> <ul> <li><a href="http://pythonhosted.org/six/?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">Six</a></li> <li><a href="http://www.secdev.org/projects/UTscapy/?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">UTScapy</a></li> <li><a href="https://codecov.io/?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">CodeCov</a></li> <li><a href="https://www.appveyor.com/?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">Appveyor</a></li> <li><a href="http://www.jython.org/?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">Jython</a></li> <li><a href="https://www.openbsd.org/?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">OpenBSD</a></li> <li><a href="https://micropython.org/?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">MicroPython</a></li> <li><a href="https://www.nsa.gov/?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">NSA</a></li> <li><a href="http://securityaffairs.co/wordpress/50586/cyber-crime/nsa-extrabacon-exploit.html?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">Extra Bacon</a></li> <li><a href="https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">SNMP</a></li> <li><a href="https://en.wikipedia.org/wiki/Abstract_Syntax_Notation_One?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">ASN.1</a></li> <li><a href="https://en.wikipedia.org/wiki/X.509?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">X509</a></li> <li><a href="https://en.wikipedia.org/wiki/Transport_Layer_Security?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">TLS</a></li> <li><a href="https://en.wikipedia.org/wiki/IPsec?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">IPSec</a></li> <li><a href="https://en.wikipedia.org/wiki/Domain_Name_System?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">DNS</a></li> <li><a href="https://en.wikipedia.org/wiki/HTTP/2?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">HTTP2</a></li> <li><a href="https://www.python.org/dev/peps/pep-0008/?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">PEP8</a></li> <li><a href="https://bitbucket.org/secdev/scapy3-prototype2/overview?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">Scapy 3</a></li> </ul> <p>The intro and outro music is from Requiem for a Fish <a href="http://freemusicarchive.org/music/The_Freak_Fandango_Orchestra/?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">The Freak Fandango Orchestra</a> / <a href="http://creativecommons.org/licenses/by-sa/3.0/?utm_source=rss&amp;utm_medium=rss" rel="noopener" target="_blank">CC BY-SA</a><img alt="" height="0" src="https://analytics.boundlessnotions.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.pythonpodcast.com%2Fepisode-107-scapy-with-guillaume-valadon%2F&amp;action_name=Scapy+with+Guillaume+Valadon+-+Episode+107&amp;urlref=https%3A%2F%2Fwww.pythonpodcast.com%2Ffeed%2F&amp;utm_source=rss&amp;utm_medium=rss" style="border: 0; width: 0; height: 0;" width="0" /></p>