aboutsummaryrefslogtreecommitdiff
path: root/netsec-assignment1-S4498062/exercise4
diff options
context:
space:
mode:
authorCamil Staps2015-09-05 13:47:35 +0200
committerCamil Staps2015-09-05 13:47:57 +0200
commitbe217b0370ecc19dd205615b739e6995c066bdd1 (patch)
tree0603788062d94a5681f43f87af66cd93e7cc1c0d /netsec-assignment1-S4498062/exercise4
Assignment 1
Diffstat (limited to 'netsec-assignment1-S4498062/exercise4')
-rwxr-xr-xnetsec-assignment1-S4498062/exercise4/sniffer.py77
-rw-r--r--netsec-assignment1-S4498062/exercise4/udp-length-mismatch-explanation6
2 files changed, 83 insertions, 0 deletions
diff --git a/netsec-assignment1-S4498062/exercise4/sniffer.py b/netsec-assignment1-S4498062/exercise4/sniffer.py
new file mode 100755
index 0000000..4cb0c5c
--- /dev/null
+++ b/netsec-assignment1-S4498062/exercise4/sniffer.py
@@ -0,0 +1,77 @@
+#!/usr/bin/env python3
+
+import socket
+import struct
+import math
+
+def parse_tcp(packet):
+ header_length = packet[12] * 4
+ header = packet[:14] # We don't care about the variable length options
+ data = packet[header_length:]
+ src_port, dst_port, seqn, ackn, flags = struct.unpack("!HHIIxB", header)
+ return src_port, dst_port, seqn, ackn, flags, data
+
+def parse_udp(packet):
+ header_length = 8
+ header = packet[:header_length]
+ data = packet[header_length:]
+ src_port, dst_port, data_len, checksum = struct.unpack("!HHHH", header)
+ return src_port, dst_port, data_len, data, checksum
+
+def parse_ip(packet):
+ header_length_in_bytes = (packet[0] & 0x0f) * 4
+ header = packet[:20]
+ data = packet[header_length_in_bytes:]
+ length, protocol, src, dst = struct.unpack("!xxHxxxxxBxx4s4s", header)
+ header = {'length': length,
+ 'protocol': protocol,
+ 'source': src,
+ 'destination': dst}
+ return header_length_in_bytes, header, data
+
+def format_ip(addr):
+ return '.'.join('%d'%i for i in addr)
+
+def parse_eth(packet):
+ if (packet[13:14] == b'\x81\x00'):
+ dst, src, typecode = struct.unpack("!6s6sxxxxH", packet[:18])
+ data = packet[18:]
+ else:
+ dst, src, typecode = struct.unpack("!6s6sH", packet[:14])
+ data = packet[14:]
+ return dst, src, typecode, data
+
+def format_mac(addr):
+ return ':'.join('%02x'%i for i in addr)
+
+def main():
+ s = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.ntohs(0x0003))
+ while True:
+ raw, address = s.recvfrom(2 ** 16 - 1)
+
+ eth_dst, eth_src, eth_type, eth_data = parse_eth(raw)
+ print("ETH: {} --> {} ({})".format(
+ format_mac(eth_dst), format_mac(eth_src), eth_type))
+
+ if eth_type == 0x0800: # IP
+ ip_header_len, ip_header, ip_payload = parse_ip(eth_data)
+ print("IP: {} --> {} ({:04x})".format(
+ format_ip(ip_header['source']),
+ format_ip(ip_header['destination']),
+ ip_header['protocol']))
+
+ if ip_header['protocol'] == 0x11: # UDP
+ src_port, dst_port, _, udp_data, _ = parse_udp(ip_payload)
+ print("UDP: :{} --> :{}".format(
+ src_port, dst_port))
+ elif ip_header['protocol'] == 0x06: # TCP
+ src_port, dst_port, seqn, ackn, flags, tcp_data = parse_tcp(
+ ip_payload)
+ print("TCP: :{} --> :{} / SEQ:{} ACK:{} ({:#02x})".format(
+ src_port, dst_port, seqn, ackn, flags))
+
+ print()
+
+if __name__ == "__main__":
+ main()
+
diff --git a/netsec-assignment1-S4498062/exercise4/udp-length-mismatch-explanation b/netsec-assignment1-S4498062/exercise4/udp-length-mismatch-explanation
new file mode 100644
index 0000000..543f7e4
--- /dev/null
+++ b/netsec-assignment1-S4498062/exercise4/udp-length-mismatch-explanation
@@ -0,0 +1,6 @@
+The length field is calculated as
+
+ length = len(header) + length(data)
+
+Therefore, it is always 8 more than the data length.
+