2016年9月2日 星期五

用Python寫一個簡單的Sniffer

當我在準備Python基本教學的投影片時,上面的人要求多補充Socket的知識
那麼,就寫一隻Python Sniffer吧!

上次寫Sniffer時,應該是大學二年級的時候了吧
那時候, wireshark 還是叫作 Ethereal 呢

當時是為了做專題需要
用 winpcap 提供的範例,自已開網卡等等等
別再回想了,一想到 MFC,我胃就痛了…

用Python寫Sniffer快多了
麻煩的地方大概是
  1. 使用RAW Socket,需要 root 權限
  2. WIN OS RAW Socket只能從IP層開始,大概要安裝其它pcap lib才能解決這問題
Socket簡單介紹的投影片有放在Python基本教學

原始碼
  1. # -*- encoding: utf-8 -*-
  2. import binascii
  3. import socket
  4. import struct
  5. import sys
  6.  
  7.  
  8. def arp_parser(packet):
  9. arp_length = 28 # fixed
  10. arp = struct.unpack("!2s2s1s1s2s6s4s6s4s", packet[0:arp_length])
  11.  
  12. print ("ARP Header :")
  13. print (" |_ SHA: {0} -> THA: {1}".format(binascii.hexlify(arp[5]), binascii.hexlify(arp[7])))
  14. print (" |_ SPA: {0} -> TPA: {1}".format(socket.inet_ntoa(arp[6]), socket.inet_ntoa(arp[8])))
  15. print (" |_ HTYPE : {0}".format(binascii.hexlify(arp[0])))
  16. print (" |_ PTYPE : {0}".format(binascii.hexlify(arp[1])))
  17. print (" |_ HLEN : {0}".format(binascii.hexlify(arp[2])))
  18. print (" |_ PLEN : {0}".format(binascii.hexlify(arp[3])))
  19. print (" |_ OPER : {0}".format(binascii.hexlify(arp[4])))
  20. #print (" |_ SHA : {0}".format(binascii.hexlify(arp[5])))
  21. #print (" |_ SPA : {0}".format(socket.inet_ntoa(arp[6])))
  22. #print (" |_ THA : {0}".format(binascii.hexlify(arp[7])))
  23. #print (" |_ TPA : {0}".format(socket.inet_ntoa(arp[8])))
  24.  
  25. # Padding dump packet[arp_length:]
  26. print (" |_ Data : {0}".format(binascii.hexlify(packet[arp_length:])))
  27.  
  28.  
  29. def icmp_parser(packet):
  30. icmp_length = 4
  31. icmp = struct.unpack("!BBH", packet[0:icmp_length])
  32.  
  33. print ("ICMP Header :")
  34. print (" |_ Type : {0}".format(icmp[0]))
  35. print (" |_ Code : {0}".format(icmp[1]))
  36. print (" |_ Checksum : {0} ({1})".format(icmp[2], hex(icmp[2])))
  37.  
  38. # Padding dump packet[icmp_length:]
  39. print (" |_ Data : {0}".format(binascii.hexlify(packet[icmp_length:])))
  40.  
  41.  
  42. def tcp_parser(packet):
  43. tcp_length = 20
  44. tcp = struct.unpack("!HHLLBBHHH", packet[0:tcp_length])
  45.  
  46. # Real tcp header length
  47. tcp_length = (tcp[4] >> 4) * 4
  48. Flags = ((tcp[4] & 0x0f) << 8) + tcp[5]
  49.  
  50. print ("TCP Header :")
  51. print (" |_ Src Port: {0} -> Dst Port: {1}".format(tcp[0], tcp[1]))
  52. print (" |_ Sequence : {0} ({1})".format(tcp[2], hex(tcp[2])))
  53. print (" |_ Acknowledgment : {0} ({1})".format(tcp[3], hex(tcp[3])))
  54. print (" |_ Length : {0}".format(tcp_length))
  55. print (" |_ Flags : {0}".format(hex(Flags)))
  56. print (" |_ Window size : {0}".format(tcp[6]))
  57. print (" |_ Checksum : {0} ({1})".format(tcp[7], hex(tcp[7])))
  58. print (" |_ Urgent pointer : {0}".format(tcp[8]))
  59.  
  60. # Padding dump packet[icmp_length:]
  61. print (" |_ Data : {0}".format(binascii.hexlify(packet[tcp_length:])))
  62.  
  63.  
  64. def udp_parser(packet):
  65. udp_length = 8
  66. udp = struct.unpack("!HHHH", packet[0:udp_length])
  67.  
  68. print ("UDP Header :")
  69. print (" |_ Src Port: {0} -> Dst Port: {1}".format(udp[0], udp[1]))
  70. print (" |_ Length : {0}".format(udp[2]))
  71. print (" |_ Checksum : {0} ({1})".format(udp[3], hex(udp[3])))
  72.  
  73. # Padding dump packet[icmp_length:]
  74. print (" |_ Data : {0}".format(binascii.hexlify(packet[udp_length:])))
  75.  
  76.  
  77. def ip_parser(packet):
  78. ip_length = 20
  79. ip = struct.unpack("!BBHHHBBH4s4s", packet[0:ip_length])
  80.  
  81. version = ip[0] >> 4
  82. IHL = (ip[0] & 0xf) * 4
  83. DiffServ = ip[1] >> 2
  84. ECN = ip[1] & 0x03
  85. Flags = ip[4] >> 13
  86. Frag_offset = ip[4] & 0x1fff
  87.  
  88. print ("IP Header :")
  89. print (" |_ From: {0} -> To: {1}".format(socket.inet_ntoa(ip[8]), socket.inet_ntoa(ip[9])))
  90. print (" |_ Version : {0}".format(version))
  91. print (" |_ Header Length : {0}".format(IHL))
  92. print (" |_ DiffServ : {0}".format(DiffServ))
  93. print (" |_ ECN : {0}".format(ECN))
  94. print (" |_ Total Length : {0}".format(ip[2]))
  95. print (" |_ Identification : {0} ({1})".format(ip[3], hex(ip[3])))
  96. print (" |_ Flags : {0}".format(Flags))
  97. print (" |_ Fragment Offset: {0}".format(Frag_offset))
  98. print (" |_ TTL : {0}".format(ip[5]))
  99. print (" |_ Protocol : {0}".format(hex(ip[6])))
  100. print (" |_ Checksum : {0} ({1})".format(ip[7], hex(ip[7])))
  101.  
  102. # next header
  103. if ip[6] == 1:
  104. # ICMP = 0x01
  105. icmp_parser(packet[IHL:])
  106. elif ip[6] == 6:
  107. # TCP = 0x06
  108. tcp_parser(packet[IHL:])
  109. elif ip[6] == 17:
  110. # UDP = 0x11
  111. udp_parser(packet[IHL:])
  112. else:
  113. pass
  114.  
  115.  
  116. def ethernet_parser(packet):
  117. eth_length = 14 # fixed
  118. eth = struct.unpack("!6s6s2s", packet[0:eth_length])
  119.  
  120. print ("ETHERNET Header :")
  121. print (" |_ From: {1} -> To: {0}".format(binascii.hexlify(eth[0]), binascii.hexlify(eth[1])))
  122. print (" |_ Type: {0}".format(binascii.hexlify(eth[2])))
  123.  
  124. # parser next header
  125. if eth[2] == b'\x08\x06':
  126. arp_parser(packet[eth_length:])
  127. elif eth[2] == b'\x08\x00':
  128. ip_parser(packet[eth_length:])
  129. else:
  130. pass
  131.  
  132.  
  133. def linux_main():
  134. rawSocket = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.htons(0x0003))
  135.  
  136. # Bind the interface, likes eth0
  137. # rawSocket.bind(("eno50332184", 0))
  138.  
  139. while True:
  140. packet = rawSocket.recvfrom(2048)[0]
  141. ethernet_parser(packet)
  142. print ("")
  143.  
  144. rawSocket.close()
  145.  
  146.  
  147. def windows_main():
  148. # create a raw socket and bind it to the public interface
  149. rawSocket = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.IPPROTO_IP)
  150.  
  151. # Bind a interface with public IP
  152. HOST = socket.gethostbyname(socket.gethostname())
  153. rawSocket.bind((HOST, 0))
  154. print ("Bind a interface : {0}".format(HOST))
  155.  
  156. rawSocket.setsockopt(socket.IPPROTO_IP, socket.IP_HDRINCL, 1) # Include IP headers
  157. rawSocket.ioctl(socket.SIO_RCVALL, socket.RCVALL_ON) # receive all packages
  158.  
  159. while True:
  160. packet = rawSocket.recvfrom(2048)[0]
  161. ip_parser(packet)
  162. print ("")
  163.  
  164. rawSocket.close()
  165.  
  166.  
  167. if __name__ == '__main__':
  168. if sys.platform.lower().startswith("win"):
  169. windows_main()
  170. else:
  171. linux_main()
  172.  

這隻程式在WinOS, Linus皆可運作
在 Python 2.7, Python 3.5 可正常執行

2 則留言:

  1. 您好,拜讀了您的大作,獲益良多
    紙是想請問,為什麼執行了這個程式,結果只能看到自己送出去的封包呢?

    回覆刪除
    回覆
    1. 我有重新驗證過,在 Linux 環境是正常的;而在 Windows 環境時,只有 ICMP 是正常的
      所以我猜想您應該是在 Windows 環境執行這個程式的
      因為 Windows 在 XP SP1 之後,有針對 RAW Socking 有增加一些限制 (防止 DOS)
      雖然我沒有測試過,若是不使用 RAW Socking 的話,也許就會正常了

      如果你仍然需要 RAW Socking 的話,我還有其它的建議可以試試看
      1. 改用 C/C++ 撰寫,使用 Winpcap lib
      2. 可以試其它的 Python 套件,如 PyPcap or Scapy,去實現你的需求

      https://www.winpcap.org/
      https://github.com/pynetwork/pypcap
      https://github.com/zlorb/scapy

      刪除