Skip to content

pysap v0.1.5

Compare
Choose a tag to compare
@martingalloar martingalloar released this 16 Jan 18:51
· 888 commits to master since this release
  • Updated to use scapy v2.3.1.
  • Code is more Python3-friendly.
  • Added travis script for running tests.
  • General minor fixes and code improvements.
  • Added test suites for SAPNI, SAPDiag and SAPRouter modules.
  • Added support for routing via SAP Router in almost all example scripts.
  • pysap/SAPDiag.py: Added support for message info and Diag error packets.
  • pysap/SAPDiag.py: Diag item lookup now support looking up multiple items, and string lookups.
  • pysap/SAPDiagClient.py: Added support for specifying support bits when connecting, support for routing via SAP Router.
  • pysap/SAPDiagClient.py: If no terminal is supplied, use a random looking IP by default to avoid identification
    (SAP Note 1497445).
  • pysap/SAPDiagItems.py: Fixes on some atom items for old versions.
  • pysap/SAPEnqueue.py: Added trace max file size field.
  • pysap/SAPNI.py: Added helpers for creating new connections.
  • pysap/SAPNI.py: SAPNIProxy implemented using a Worker thread.
  • pysap/SAPNI.py: SAPNIServer implemented using SAPNIStreamSocket.
  • pysap/SAPRouter.py: Added route hop conversion helpers.
  • pysap/SAPRouter.py: Added info client and info server packets.
  • pysap/SAPRouter.py: Added SAPRoutedStreamSocket.
  • pysap/utils.py: Reimplemented MutablePacketField with evaluators.
  • pysapcompress/pysapcompress.cpp: Improved routines and added handling of some error conditions.
  • examples/diag_capturer.py: New example script for dumping Diag login credentials by sniffing or reading a pcap file.
  • examples/enqueue_monitor.py: Added command for get replication info and command for checking trace pattern endless
    loop vulnerability (CVE-2014-0995).
  • examples/router_admin.py: Parsing of info request responses.
  • examples/router_password_check: New example script for testing if a SAP Router is vulnerable to a timing attack on
    the password check (CVE-2014-0984).
  • requirements-optional.txt: Added optional requirements.