Releases
v0.1.5
Updated to use scapy v2.3.1.
Code is more Python3-friendly.
Added travis script for running tests.
General minor fixes and code improvements.
Added test suites for SAPNI, SAPDiag and SAPRouter modules.
Added support for routing via SAP Router in almost all example scripts.
pysap/SAPDiag.py
: Added support for message info and Diag error packets.
pysap/SAPDiag.py
: Diag item lookup now support looking up multiple items, and string lookups.
pysap/SAPDiagClient.py
: Added support for specifying support bits when connecting, support for routing via SAP Router.
pysap/SAPDiagClient.py
: If no terminal is supplied, use a random looking IP by default to avoid identification
(SAP Note 1497445 ).
pysap/SAPDiagItems.py
: Fixes on some atom items for old versions.
pysap/SAPEnqueue.py
: Added trace max file size field.
pysap/SAPNI.py
: Added helpers for creating new connections.
pysap/SAPNI.py
: SAPNIProxy
implemented using a Worker thread.
pysap/SAPNI.py
: SAPNIServer
implemented using SAPNIStreamSocket
.
pysap/SAPRouter.py
: Added route hop conversion helpers.
pysap/SAPRouter.py
: Added info client and info server packets.
pysap/SAPRouter.py
: Added SAPRoutedStreamSocket
.
pysap/utils.py
: Reimplemented MutablePacketField
with evaluators.
pysapcompress/pysapcompress.cpp
: Improved routines and added handling of some error conditions.
examples/diag_capturer.py
: New example script for dumping Diag login credentials by sniffing or reading a pcap file.
examples/enqueue_monitor.py
: Added command for get replication info and command for checking trace pattern endless
loop vulnerability (CVE-2014-0995 ).
examples/router_admin.py
: Parsing of info request responses.
examples/router_password_check
: New example script for testing if a SAP Router is vulnerable to a timing attack on
the password check (CVE-2014-0984 ).
requirements-optional.txt
: Added optional requirements.
You can’t perform that action at this time.