86890704fd
todo: add documentation & wireshark dissector
276 lines
9.3 KiB
Python
Executable file
276 lines
9.3 KiB
Python
Executable file
# This file is part of Scapy
|
|
# See http://www.secdev.org/projects/scapy for more information
|
|
# Copyright (C) Philippe Biondi <phil@secdev.org>
|
|
# This program is published under a GPLv2 license
|
|
|
|
"""
|
|
Sessions: decode flow of packets when sniffing
|
|
"""
|
|
|
|
from collections import defaultdict
|
|
from scapy.compat import raw
|
|
from scapy.config import conf
|
|
from scapy.packet import NoPayload
|
|
from scapy.plist import PacketList
|
|
|
|
|
|
class DefaultSession(object):
|
|
"""Default session: no stream decoding"""
|
|
|
|
def __init__(self, prn=None, store=False, supersession=None,
|
|
*args, **karg):
|
|
self.__prn = prn
|
|
self.__store = store
|
|
self.lst = []
|
|
self.__count = 0
|
|
self._supersession = supersession
|
|
if self._supersession:
|
|
self._supersession.prn = self.__prn
|
|
self._supersession.store = self.__store
|
|
self.__store = False
|
|
self.__prn = None
|
|
|
|
@property
|
|
def store(self):
|
|
return self.__store
|
|
|
|
@store.setter
|
|
def store(self, val):
|
|
if self._supersession:
|
|
self._supersession.store = val
|
|
else:
|
|
self.__store = val
|
|
|
|
@property
|
|
def prn(self):
|
|
return self.__prn
|
|
|
|
@prn.setter
|
|
def prn(self, f):
|
|
if self._supersession:
|
|
self._supersession.prn = f
|
|
else:
|
|
self.__prn = f
|
|
|
|
@property
|
|
def count(self):
|
|
if self._supersession:
|
|
return self._supersession.count
|
|
else:
|
|
return self.__count
|
|
|
|
def toPacketList(self):
|
|
if self._supersession:
|
|
return PacketList(self._supersession.lst, "Sniffed")
|
|
else:
|
|
return PacketList(self.lst, "Sniffed")
|
|
|
|
def on_packet_received(self, pkt):
|
|
"""DEV: entry point. Will be called by sniff() for each
|
|
received packet (that passes the filters).
|
|
"""
|
|
if not pkt:
|
|
return
|
|
if isinstance(pkt, list):
|
|
for p in pkt:
|
|
DefaultSession.on_packet_received(self, p)
|
|
return
|
|
self.__count += 1
|
|
if self.store:
|
|
self.lst.append(pkt)
|
|
if self.prn:
|
|
result = self.prn(pkt)
|
|
if result is not None:
|
|
print(result)
|
|
|
|
|
|
class IPSession(DefaultSession):
|
|
"""Defragment IP packets 'on-the-flow'.
|
|
|
|
Usage:
|
|
>>> sniff(session=IPSession)
|
|
"""
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
DefaultSession.__init__(self, *args, **kwargs)
|
|
self.fragments = defaultdict(list)
|
|
|
|
def _ip_process_packet(self, packet):
|
|
from scapy.layers.inet import _defrag_list, IP
|
|
if IP not in packet:
|
|
return packet
|
|
ip = packet[IP]
|
|
packet._defrag_pos = 0
|
|
if ip.frag != 0 or ip.flags.MF:
|
|
uniq = (ip.id, ip.src, ip.dst, ip.proto)
|
|
self.fragments[uniq].append(packet)
|
|
if not ip.flags.MF: # end of frag
|
|
try:
|
|
if self.fragments[uniq][0].frag == 0:
|
|
# Has first fragment (otherwise ignore)
|
|
defrag, missfrag = [], []
|
|
_defrag_list(self.fragments[uniq], defrag, missfrag)
|
|
defragmented_packet = defrag[0]
|
|
defragmented_packet = defragmented_packet.__class__(
|
|
raw(defragmented_packet)
|
|
)
|
|
return defragmented_packet
|
|
finally:
|
|
del self.fragments[uniq]
|
|
else:
|
|
return packet
|
|
|
|
def on_packet_received(self, pkt):
|
|
pkt = self._ip_process_packet(pkt)
|
|
DefaultSession.on_packet_received(self, pkt)
|
|
|
|
|
|
class StringBuffer(object):
|
|
"""StringBuffer is an object used to re-order data received during
|
|
a TCP transmission.
|
|
|
|
Each TCP fragment contains a sequence number, which marks
|
|
(relatively to the first sequence number) the index of the data contained
|
|
in the fragment.
|
|
|
|
If a TCP fragment is missed, this class will fill the missing space with
|
|
zeros.
|
|
"""
|
|
def __init__(self):
|
|
self.content = bytearray(b"")
|
|
self.content_len = 0
|
|
self.incomplete = []
|
|
|
|
def append(self, data, seq):
|
|
data_len = len(data)
|
|
seq = seq - 1
|
|
if seq + data_len > self.content_len:
|
|
self.content += b"\x00" * (seq - self.content_len + data_len)
|
|
# If data was missing, mark it.
|
|
self.incomplete.append((self.content_len, seq))
|
|
self.content_len = seq + data_len
|
|
assert len(self.content) == self.content_len
|
|
# XXX removes empty space marker.
|
|
# for ifrag in self.incomplete:
|
|
# if [???]:
|
|
# self.incomplete.remove([???])
|
|
memoryview(self.content)[seq:seq + data_len] = data
|
|
|
|
def full(self):
|
|
# Should only be true when all missing data was filled up,
|
|
# (or there never was missing data)
|
|
return True # XXX
|
|
|
|
def clear(self):
|
|
self.__init__()
|
|
|
|
def __bool__(self):
|
|
return bool(self.content_len)
|
|
__nonzero__ = __bool__
|
|
|
|
def __len__(self):
|
|
return self.content_len
|
|
|
|
def __bytes__(self):
|
|
return bytes(self.content)
|
|
__str__ = __bytes__
|
|
|
|
|
|
class TCPSession(IPSession):
|
|
"""A Session that matches seq/ack packets together to dissect
|
|
special protocols, such as HTTP.
|
|
|
|
DEV: implement a class-function `tcp_reassemble` in your Packet class::
|
|
|
|
@classmethod
|
|
def tcp_reassemble(cls, data, metadata):
|
|
# data = the reassembled data from the same request/flow
|
|
# metadata = empty dictionary, that can be used to store data
|
|
[...]
|
|
# If the packet is available, return it. Otherwise don't.
|
|
# Whenever you return a packet, the buffer will be discarded.
|
|
return pkt
|
|
# Otherwise, maybe store stuff in metadata, and return None,
|
|
# as you need additional data.
|
|
return None
|
|
|
|
A (hard to understand) example can be found in scapy/layers/http.py
|
|
"""
|
|
|
|
fmt = ('TCP {IP:%IP.src%}{IPv6:%IPv6.src%}:%r,TCP.sport% > ' +
|
|
'{IP:%IP.dst%}{IPv6:%IPv6.dst%}:%r,TCP.dport%')
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
super(TCPSession, self).__init__(*args, **kwargs)
|
|
# The StringBuffer() is used to build a global
|
|
# string from fragments and their seq nulber
|
|
self.tcp_frags = defaultdict(
|
|
lambda: (StringBuffer(), {})
|
|
)
|
|
|
|
def _process_packet(self, pkt):
|
|
"""Process each packet: matches the TCP seq/ack numbers
|
|
to follow the TCP streams, and orders the fragments.
|
|
"""
|
|
from scapy.layers.inet import IP, TCP
|
|
if not pkt or TCP not in pkt:
|
|
return pkt
|
|
pay = pkt[TCP].payload
|
|
if isinstance(pay, (NoPayload, conf.padding_layer)):
|
|
return pkt
|
|
new_data = raw(pay)
|
|
# Match packets by a uniqute TCP identifier
|
|
seq = pkt[TCP].seq
|
|
ident = pkt.sprintf(self.fmt)
|
|
data, metadata = self.tcp_frags[ident]
|
|
# Let's guess which class is going to be used
|
|
if "pay_class" not in metadata:
|
|
pay_class = pay.__class__
|
|
if not hasattr(pay_class, "tcp_reassemble"):
|
|
# Cannot tcp-reassemble
|
|
return pkt
|
|
metadata["pay_class"] = pay_class
|
|
else:
|
|
pay_class = metadata["pay_class"]
|
|
# Get a relative sequence number for a storage purpose
|
|
relative_seq = metadata.get("relative_seq", None)
|
|
if not relative_seq:
|
|
relative_seq = metadata["relative_seq"] = seq - 1
|
|
seq = seq - relative_seq
|
|
# Add the data to the buffer
|
|
# Note that this take care of retransmission packets.
|
|
data.append(new_data, seq)
|
|
# Check TCP FIN or TCP RESET
|
|
if pkt[TCP].flags.F or pkt[TCP].flags.R:
|
|
metadata["tcp_end"] = True
|
|
|
|
# In case any app layer protocol requires it,
|
|
# allow the parser to inspect TCP PSH flag
|
|
if pkt[TCP].flags.P:
|
|
metadata["tcp_psh"] = True
|
|
# XXX TODO: check that no empty space is missing in the buffer.
|
|
# XXX Currently, if a TCP fragment was missing, we won't notice it.
|
|
packet = None
|
|
if data.full():
|
|
# Reassemble using all previous packets
|
|
packet = pay_class.tcp_reassemble(bytes(data), metadata)
|
|
# Stack the result on top of the previous frames
|
|
if packet:
|
|
data.clear()
|
|
del self.tcp_frags[ident]
|
|
pay.underlayer.remove_payload()
|
|
if IP in pkt:
|
|
pkt[IP].len = None
|
|
pkt[IP].chksum = None
|
|
return pkt / packet
|
|
|
|
def on_packet_received(self, pkt):
|
|
"""Hook to the Sessions API: entry point of the dissection.
|
|
This will defragment IP if necessary, then process to
|
|
TCP reassembly.
|
|
"""
|
|
# First, defragment IP if necessary
|
|
pkt = self._ip_process_packet(pkt)
|
|
# Now handle TCP reassembly
|
|
pkt = self._process_packet(pkt)
|
|
DefaultSession.on_packet_received(self, pkt)
|