复制套接字缓冲区时,使用ctypes的Python数据包嗅探器崩溃

时间:2016-08-05 21:42:26

标签: python sockets buffer ctypes packet-sniffers

我正在尝试捕获IP数据包的前20个字节(完整数据包减去选项),填充structctype成员,并将我想要的信息打印到屏幕上(协议,源和目标地址)。我的IP类如下:

import socket
import os
import struct
from ctypes import *

# host to listen on
host = "192.168.0.187"
# our IP header
class IP(Structure):
        _fields_ = [
            ("ihl", c_ubyte, 4),
            ("version", c_ubyte, 4),
            ("tos", c_ubyte),
            ("len", c_ushort),
            ("id", c_ushort),
            ("offset", c_ushort),
            ("ttl", c_ubyte),
            ("protocol_num", c_ubyte),
            ("sum", c_ushort),
            ("src", c_ulong),
            ("dst", c_ulong)
        ]
    def __new__(self, socket_buffer=None):
        return self.from_buffer_copy(socket_buffer)
    def __init__(self, socket_buffer=None):
        # map protocol constants to their names
        self.protocol_map = {1:"ICMP", 6:"TCP", 17:"UDP"}
        # human readable IP addresses
        self.src_address = socket.inet_ntoa(struct.pack("<L",self.src))
        self.dst_address = socket.inet_ntoa(struct.pack("<L",self.dst))
        # human readable protocol
        try:
            self.protocol = self.protocol_map[self.protocol_num]
        except:
            self.protocol = str(self.protocol_num)

现在,我创建套接字,将其绑定到主机,然后循环以获取数据包:

# create socket and bind to public interface (os dependent)
if os.name == "nt":
    socket_protocol = socket.IPPROTO_IP
else:
    socket_protocol = socket.IPPROTO_ICMP

# create raw socket
sniffer = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket_protocol)
sniffer.bind((host, 0))
# include header information
sniffer.setsockopt(socket.IPPROTO_IP, socket.IP_HDRINCL, 1)

if os.name == "nt":
    sniffer.ioctl(socket.SIO_RCVALL, socket.RCVALL_ON)

try:
    while True:
        # read in a packet
        raw_buffer = sniffer.recvfrom(65565)[0]
        # create an IP header from the first 20 bytes of the buffer
        ip_header = IP(raw_buffer[0:20])
        # print out the protocol that was detected and the hosts
        print "Protocol: %s %s -> %s" % (ip_header.protocol, ip_header.src_¬
                                address, ip_header.dst_address)
# handle CTRL-C
except KeyboardInterrupt:
    # if we're using Windows, turn off promiscuous mode
    if os.name == "nt":
        sniffer.ioctl(socket.SIO_RCVALL, socket.RCVALL_OFF)

使用c_ulong作为"src""dst" _fields_ struct成员的数据类型运行时,出现以下错误(在一个终端运行时) ping另一个nostarch.com):

enter image description here

我假设c_ulong的大小可能大于一个字节,因此抛弃了我对前20个字节的要求(我对python来说很新)。然后我将c_ulong更改为c_ushort并再次运行:

enter image description here

实际ping路径:

enter image description here

因此,虽然脚本运行没有错误,但它正在切断srcdst地址。

当我告诉它时,为什么要求至少32个字节我只想要前20个?

(我在Kali64 VBox VM中,在Win7主机上运行,​​使用Python 2.7)

感谢任何帮助。

1 个答案:

答案 0 :(得分:1)

应验证IP的大小,即

print(sizeof(IP))

应该返回20个字节。由于在{64} linux的情况下ctypes.u_long为8,因此大小将为32字节(由于填充而增加4个字节,由于整数大小而增加8个字节)。使用ctypes.u_int或显式大小如下:

from ctypes import *

class IP(Structure):
    _fields_ = [ ("version", c_uint8, 4),
                 ("ihl", c_uint8, 4),
                 ("tos", c_uint8),
                 ("len", c_uint16),
                 ("id", c_uint16),
                 ("offset", c_uint16),
                 ("ttl", c_uint8),
                 ("protocol_num", c_uint8),
                 ("sum", c_uint16),
                 ("src", c_uint32),
                 ("dst", c_uint32) ]

print(sizeof(IP))
相关问题