diff options
author | Camil Staps | 2015-09-05 13:47:35 +0200 |
---|---|---|
committer | Camil Staps | 2015-09-05 13:47:57 +0200 |
commit | be217b0370ecc19dd205615b739e6995c066bdd1 (patch) | |
tree | 0603788062d94a5681f43f87af66cd93e7cc1c0d /netsec-assignment1-S4498062/exercise4 |
Assignment 1
Diffstat (limited to 'netsec-assignment1-S4498062/exercise4')
-rwxr-xr-x | netsec-assignment1-S4498062/exercise4/sniffer.py | 77 | ||||
-rw-r--r-- | netsec-assignment1-S4498062/exercise4/udp-length-mismatch-explanation | 6 |
2 files changed, 83 insertions, 0 deletions
diff --git a/netsec-assignment1-S4498062/exercise4/sniffer.py b/netsec-assignment1-S4498062/exercise4/sniffer.py new file mode 100755 index 0000000..4cb0c5c --- /dev/null +++ b/netsec-assignment1-S4498062/exercise4/sniffer.py @@ -0,0 +1,77 @@ +#!/usr/bin/env python3 + +import socket +import struct +import math + +def parse_tcp(packet): + header_length = packet[12] * 4 + header = packet[:14] # We don't care about the variable length options + data = packet[header_length:] + src_port, dst_port, seqn, ackn, flags = struct.unpack("!HHIIxB", header) + return src_port, dst_port, seqn, ackn, flags, data + +def parse_udp(packet): + header_length = 8 + header = packet[:header_length] + data = packet[header_length:] + src_port, dst_port, data_len, checksum = struct.unpack("!HHHH", header) + return src_port, dst_port, data_len, data, checksum + +def parse_ip(packet): + header_length_in_bytes = (packet[0] & 0x0f) * 4 + header = packet[:20] + data = packet[header_length_in_bytes:] + length, protocol, src, dst = struct.unpack("!xxHxxxxxBxx4s4s", header) + header = {'length': length, + 'protocol': protocol, + 'source': src, + 'destination': dst} + return header_length_in_bytes, header, data + +def format_ip(addr): + return '.'.join('%d'%i for i in addr) + +def parse_eth(packet): + if (packet[13:14] == b'\x81\x00'): + dst, src, typecode = struct.unpack("!6s6sxxxxH", packet[:18]) + data = packet[18:] + else: + dst, src, typecode = struct.unpack("!6s6sH", packet[:14]) + data = packet[14:] + return dst, src, typecode, data + +def format_mac(addr): + return ':'.join('%02x'%i for i in addr) + +def main(): + s = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.ntohs(0x0003)) + while True: + raw, address = s.recvfrom(2 ** 16 - 1) + + eth_dst, eth_src, eth_type, eth_data = parse_eth(raw) + print("ETH: {} --> {} ({})".format( + format_mac(eth_dst), format_mac(eth_src), eth_type)) + + if eth_type == 0x0800: # IP + ip_header_len, ip_header, ip_payload = parse_ip(eth_data) + print("IP: {} --> {} ({:04x})".format( + format_ip(ip_header['source']), + format_ip(ip_header['destination']), + ip_header['protocol'])) + + if ip_header['protocol'] == 0x11: # UDP + src_port, dst_port, _, udp_data, _ = parse_udp(ip_payload) + print("UDP: :{} --> :{}".format( + src_port, dst_port)) + elif ip_header['protocol'] == 0x06: # TCP + src_port, dst_port, seqn, ackn, flags, tcp_data = parse_tcp( + ip_payload) + print("TCP: :{} --> :{} / SEQ:{} ACK:{} ({:#02x})".format( + src_port, dst_port, seqn, ackn, flags)) + + print() + +if __name__ == "__main__": + main() + diff --git a/netsec-assignment1-S4498062/exercise4/udp-length-mismatch-explanation b/netsec-assignment1-S4498062/exercise4/udp-length-mismatch-explanation new file mode 100644 index 0000000..543f7e4 --- /dev/null +++ b/netsec-assignment1-S4498062/exercise4/udp-length-mismatch-explanation @@ -0,0 +1,6 @@ +The length field is calculated as + + length = len(header) + length(data) + +Therefore, it is always 8 more than the data length. + |