我正在尝试使用以下命令发送带有scapy的UDP数据包:
>> send(IP(dst="127.0.0.1",src="111.111.111.111")/UDP(dport=5005)/"Hello")
.
Sent 1 packets.
从tcpdump
我可以看到:
22:02:58.384730 IP 111.111.111.111.domain > localhost.5005: [|domain]
我正在尝试使用以下代码接收此数据包:
import socket
UDP_IP = "127.0.0.1"
UDP_PORT = 5005
sock = socket.socket(socket.AF_INET, # Internet
socket.SOCK_DGRAM) # UDP
sock.bind((UDP_IP, UDP_PORT))
while True:
data, addr = sock.recvfrom(1024) # buffer size is 1024 bytes
print "received message:", data
但无法收到消息。
我已经通过以下代码正常发送udp数据包来测试网络,并且可以接收数据包:
import socket
import time
UDP_IP = "127.0.0.1"
UDP_PORT = 5005
print "UDP target IP:", UDP_IP
print "UDP target port:", UDP_PORT
sock = socket.socket(socket.AF_INET, # Internet
socket.SOCK_DGRAM) # UDP
num = 0
while True:
sock.sendto(str(num), (UDP_IP, UDP_PORT))
print "Message sent: " + str(num)
num += 1
time.sleep(1)
非常感谢任何帮助。
----------------更新-----------------------
Scapy发送的无法接收的数据包:
13:22:52.984862 IP (tos 0x0, ttl 64, id 1, offset 0, flags [DF], proto UDP (17), length 33)
127.0.0.1.5555 > 127.0.0.1.12345: [udp sum ok] UDP, length 5
0x0000: 4500 0021 0001 4000 4011 3cc9 7f00 0001 E..!..@.@.<.....
0x0010: 7f00 0001 15b3 3039 000d 9813 4865 6c6c ......09....Hell
0x0020: 6f
o
虽然可以接收普通python脚本发送的数据包:
13:20:02.374481 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 33)
127.0.0.1.53143 > 127.0.0.1.12345: [bad udp cksum 0xfe20 -> 0xde2e!] UDP, length 5
0x0000: 4500 0021 0000 4000 4011 3cca 7f00 0001 E..!..@.@.<.....
0x0010: 7f00 0001 cf97 3039 000d fe20 4865 6c6c ......09....Hell
0x0020: 6f
答案 0 :(得分:2)
看起来您正在使用Scapy将UDP流量发送到您的localhost接口。在send()
功能中,指定适当的出站接口以发送流量。
示例:
send((IP(dst="127.0.0.1",src="111.111.111.111")/UDP(dport=5005)/"Hello"),iface="lo0")
在我的电脑上,lo0是我的本地环回接口。要查看或设置scapy的默认界面,请查看此帖子的下半部分:http://thepacketgeek.com/scapy-p-02-installing-python-and-scapy/
答案 1 :(得分:0)
你可以使用nfqueue和iptables: 您定义了一个规则,用于将数据包定向到队列,然后使用您的脚本拦截它们。
这是一个基本的例子:
import nfqueue, socket
from scapy.all import *
import os
#add iptables rule
os.system('iptables -A OUTPUT -j NFQUEUE --queue-num 0')
#since you are sending packets from your machine you can get them in the OUPUT hook or even in the POSTROUTING hook.
#Set the callback for received packets. The callback should expect the payload:
def cb(payload):
data = payload.get_data()
p = IP(data)
#your manipulation
q = nfqueue.queue()
q.open()
q.unbind(socket.AF_INET)
q.bind(socket.AF_INET)
q.set_callback(cb)
q.create_queue(0) #Same queue number of the rule
try:
q.try_run()
except KeyboardInterrupt, e:
os.system('iptables -t -F') #remove iptables rule
print "interruption"
q.unbind(socket.AF_INET)
q.close()