Scapy中的套接字实现

时间:2019-05-15 15:32:27

标签: sockets networking scapy

我有一个使用TCP与服务器通信的应用程序,我试图模拟该服务器并与我的应用程序通信。

我还完成了mitm来将应用程序流量重定向到我的计算机。 问题是我不能在python中使用套接字,因为IP将是我的IP而不是服务器的IP,所以我试图用欺骗的方式欺骗​​源IP,但是我没有套接字,很容易使用API​​。

是否有任何用scapy编写的套接字模块或scapy模块中的任何内置函数/类,都允许您使用类似套接字的API来处理TCP通信? 或者,使用python中的套接字模块并欺骗源IP。

1 个答案:

答案 0 :(得分:0)

好吧,我必须自己实现它,我开始用python创建套接字类,它可以工作,但并不完美。

from scapy.all import *    

class socket(object):
def __init__(self, src_ip, dst_ip, port):
    self.src_ip = src_ip
    self.dst_ip = dst_ip
    self.port = port

    self._seq = 10000
    self._ack = 0
    self.dport = None


def handshake(self):
    #print self.src_ip, self.dst_ip
    syn = sniff(count=1, lfilter = lambda x: x.haslayer(IP) and x.haslayer(TCP) and x[IP].dst == self.src_ip and x[IP].src == self.dst_ip and x[TCP].dport == self.port)[0]
    self.dport = syn[TCP].sport
    syn_ack = IP(src = self.src_ip, dst = self.dst_ip) / TCP(flags = 'SA', seq = 20000, ack = syn[TCP].seq + 1, sport = self.port, dport = syn[TCP].sport)
    send(syn_ack)
    self._ack = syn_ack[TCP].ack


def recv(self):
    push = sniff(count=1, lfilter = lambda x: x.haslayer(IP) and x.haslayer(TCP) and x[IP].dst == self.src_ip and x[IP].src == self.dst_ip and x[TCP].dport == self.port and
    x[TCP].flags == 24)[0]

    #self._ack += len(push[TCP].load)

    #pack = IP(src = self.src_ip, dst = self.dst_ip) / TCP(flags = 'A', seq = self._seq, ack = self._ack, sport = 8070, dport = push[TCP].sport)
    #send(pack)

    # saves last packet's seq, ack and length of data
    a, b, c = push[TCP].seq, push[TCP].ack, len(push[Raw].load)

    self._seq = b
    self._ack = a + c

    pack = IP(src = self.src_ip, dst = self.dst_ip) / TCP(flags = 'A', seq = self._seq, ack = self._ack, sport = self.port, dport = push[TCP].sport)
    send(pack)


    return push[Raw].load


def send(self, data):
    pack = IP(src = self.src_ip, dst = self.dst_ip) / TCP(flags = 24, seq = self._seq, ack = self._ack, sport = self.port, dport = self.dport) / data
    send(pack)


def fin(self):
    fin_ack = sniff(count=1, lfilter = lambda x: x.haslayer(IP) and x.haslayer(TCP) and x[IP].dst == self.src_ip and x[IP].src == self.dst_ip and x[TCP].dport == self.port and
    x[TCP].flags == 17)[0]

    a, b = fin_ack[TCP].seq, fin_ack[TCP].ack
    pack = IP(src = self.src_ip, dst = self.dst_ip) / TCP(flags = 17, seq = b, ack = a + 1, sport = self.port, dport = self.dport)

    send(pack)

您可以在我的github中遵循此模块进行将来的发布: https://github.com/dindibo/Scapy-socket