用scapy在python中编写一个以太网桥

时间:2012-02-18 01:06:12

标签: python network-programming packet-sniffers scapy

我想做这样的事情:

            10.1.1.0/24          10.1.2.0/24

+------------+       +------------+       +------------+
|            |       |            |       |            |
|            |       |            |       |            |
|     A    d +-------+ e   B    f +-------+ g   C      |
|            |       |            |       |            |
|            |       |            |       |            |
+------------+       +------------+       +------------+

    d              e           f           g
    10.1.1.1       10.1.1.2    10.1.2.1    10.1.2.2

以便A可以通过C将数据包发送到B

我试图通过在B上运行scapy程序来嗅探端口ef来构建此内容,并在每种情况下修改目标IP和MAC数据包中的地址,然后通过其他接口发送。类似的东西:

my_macs = [get_if_hwaddr(i) for i in get_if_list()]
pktcnt = 0
dest_mac_address = discover_mac_for_ip(dest_ip) # 
output_mac = get_if_hwaddr(output_interface)

def process_packet(pkt):
    # ignore packets that were sent from one of our own interfaces
    if pkt[Ether].src in my_macs:
        return

    pktcnt += 1
    p = pkt.copy()
    # if this packet has an IP layer, change the dst field
    # to our final destination
    if IP in p:
        p[IP].dst = dest_ip

    # if this packet has an ethernet layer, change the dst field
    # to our final destination. We have to worry about this since
    # we're using sendp (rather than send) to send the packet.  We
    # also don't fiddle with it if it's a broadcast address.
    if Ether in p \
       and p[Ether].dst != 'ff:ff:ff:ff:ff:ff':
        p[Ether].dst = dest_mac_address
        p[Ether].src = output_mac

    # use sendp to avoid ARP'ing and stuff
    sendp(p, iface=output_interface)

sniff(iface=input_interface, prn=process_packet)

然而,当我运行这个东西(完整的源here)时,各种疯狂的事情开始发生......一些数据包通过了,我甚至得到了一些响应(用{{1}进行测试但是有一些类型的反馈循环会导致一堆重复的数据包被发送......

有什么想法在这里发生了什么?尝试这样做是否很疯狂?

我有点怀疑反馈循环是由ping正在对数据包进行某种处理这一事实引起的...有没有办法阻止操作系统处理数据包在我闻了之后?

2 个答案:

答案 0 :(得分:3)

使用scapy桥接的IP数据包:

  1. 首先确保您已禁用IP转发,否则将注意到重复的数据包:
  2.   

    echo "0" > /proc/sys/net/ipv4/ip_forward <br>

    1. 第二次运行以下python / scapy脚本:
    2. !在/ usr / bin中/ python2

      from optparse import OptionParser
      from scapy.all import *
      from threading import Thread
      from struct import pack, unpack
      from time import sleep
      
      def sp_byte(val):
          return pack("<B", val)
      
      def su_nint(str):
          return unpack(">I", str)[0]
      
      def ipn2num(ipn):
          """ipn(etwork) is BE dotted string ip address
          """
          if ipn.count(".") != 3:
              print("ipn2num warning: string < %s > is not proper dotted IP address" % ipn)
      
          return su_nint( "".join([sp_byte(int(p)) for p in ipn.strip().split(".")]))
      
      def get_route_if(iface):
          try:
              return [route for route in conf.route.routes if route[3] == iface and route[2] == "0.0.0.0"][0]
          except IndexError:
              print("Interface '%s' has no ip address configured or link is down?" % (iface));
              return None;
      
      class PacketCapture(Thread):
      
          def __init__(self, net, nm, recv_iface, send_iface):
              Thread.__init__(self)
      
              self.net = net
              self.netmask = nm
              self.recv_iface = recv_iface
              self.send_iface = send_iface
              self.recv_mac = get_if_hwaddr(recv_iface)
              self.send_mac = get_if_hwaddr(send_iface)
              self.filter = "ether dst %s and ip" % self.recv_mac
              self.arp_cache = []
      
              self.name = "PacketCapture(%s on %s)" % (self.name, self.recv_iface)
      
              self.fw_count = 0
      
          def run(self):
      
              print("%s: waiting packets (%s) on interface %s" % (self.name, self.filter, self.recv_iface))
      
              sniff(count = 0,  prn = self.process, store = 0, filter = self.filter, iface = self.recv_iface)
      
          def process(self, pkt):
      
              # only bridge IP packets
              if pkt.haslayer(Ether) and pkt.haslayer(IP):
      
                  dst_n = ipn2num(pkt[IP].dst)
      
                  if dst_n & self.netmask != self.net:
                      # don't forward if the destination ip address
                      # doesn't match the destination network address
                      return
      
                  # update layer 2 addresses
                  rmac = self.get_remote_mac(pkt[IP].dst)
                  if rmac == None:
                      print("%s: packet not forwarded %s %s -) %s %s" % (self.name, pkt[Ether].src, pkt[IP].src, pkt[Ether].dst, pkt[IP].dst))
                      return
      
                  pkt[Ether].src = self.send_mac
                  pkt[Ether].dst = rmac
      
                  #print("%s: forwarding %s %s -> %s %s" % (self.name, pkt[Ether].src, pkt[IP].src, pkt[Ether].dst, pkt[IP].dst))
      
                  sendp(pkt, iface = self.send_iface)
      
                  self.fw_count += 1
      
          def get_remote_mac(self, ip):
      
              mac = ""
      
              for m in self.arp_cache:
                  if m["ip"] == ip and m["mac"]:
                      return m["mac"]
      
              mac = getmacbyip(ip)
              if mac == None:
                  print("%s: Could not resolve mac address for destination ip address %s" % (self.name, ip))
              else:
                  self.arp_cache.append({"ip": ip, "mac": mac})
      
              return mac
      
          def stop(self):
              Thread._Thread__stop(self)
              print("%s stopped" % self.name)
      
      
      if __name__ == "__main__":
          parser = OptionParser(description = "Bridge packets", prog = "brscapy", usage = "Usage: brscapy -l <intf> (--left= <intf>) -r <inft> (--right=<intf>)")
          parser.add_option("-l", "--left",  action = "store", dest = "left",  default = None, choices = get_if_list(), help = "Left side network interface of the bridge")
          parser.add_option("-r", "--right", action = "store", dest = "right", default = None, choices = get_if_list(), help = "Right side network interface of the bridge")
      
          args, opts = parser.parse_args()
      
          if len(sys.argv) == 1:
              parser.print_help()
              sys.exit(1)
      
          lif = args.left
          rif = args.right
      
          lroute = get_route_if(lif)
          rroute = get_route_if(rif)
      
          if (lroute == None or rroute == None):
              print("Invalid ip addressing on given interfaces");
              exit(1)
      
          if (len(lroute) != 5 or len(rroute) != 5):
              print("Invalid scapy routes")
              exit(1)
      
          conf.verb = 0
      
          lthread = PacketCapture(rroute[0], rroute[1], lif, rif)
          rthread = PacketCapture(lroute[0], lroute[1], rif, lif)
      
          lthread.start()
          rthread.start()
      
          try:
              while True:
                  sys.stdout.write("FORWARD count: [%s -> %s  %d] [%s <- %s  %d]\r" % (lif, rif, lthread.fw_count, lif, rif, rthread.fw_count))
                  sys.stdout.flush()
                  sleep(0.1)
          except KeyboardInterrupt:
              pass
      
          lthread.stop()
          rthread.stop()
      
          lthread.join()
          rthread.join()
      

      在我的电脑上:

      # ./brscapy.py --help
      Usage: brscapy -l <intf> (--left= <intf>) -r <inft> (--right=<intf>)
      
      Bridge packets
      
      Options:
        -h, --help            show this help message and exit
        -l LEFT, --left=LEFT  Left side network interface of the bridge
        -r RIGHT, --right=RIGHT
                              Right side network interface of the bridge
      
      # ./brscapy.py -l e0 -r e2
      PacketCapture(Thread-1 on e0): waiting packets (ether dst 00:16:41:ea:ff:dc and ip) on interface e0
      PacketCapture(Thread-2 on e2): waiting packets (ether dst 00:0d:88:cc:ed:15 and ip) on interface e2
      FORWARD count: [e0 -> e2  5] [e0 <- e2  5]
      

答案 1 :(得分:2)

这样做有点疯狂,但花费你的时间并不是一种糟糕的方式。你会学到很多有趣的东西。然而,您可能想要考虑将数据包挂得更低 - 我不认为scapy能够实际拦截数据包 - 所有libpcap都设置为promisc并让你看到一切,所以你和内核都得到了相同的东西。如果您转身并重新发送,那可能是您的数据包风暴的原因。

但是,您可以设置一些创意防火墙规则,将每个接口彼此分开并以此方式处理数据包,或者使用类似divert sockets的内容来实际将数据包从内核中删除,这样您就可以了可以和他们在一起。