使用python raw socket進(jìn)行TCP SYN掃描
1. TCP SYN掃描
端口掃描常用于用于探測(cè)服務(wù)器或主機(jī)開(kāi)放端口情況,被計(jì)算機(jī)管理員用于確認(rèn)安全策略,同時(shí)被攻擊者用于識(shí)別目標(biāo)主機(jī)上的可運(yùn)作的網(wǎng)絡(luò)服務(wù)。端口掃描是向一定范圍的服務(wù)器端口發(fā)送對(duì)應(yīng)請(qǐng)求,以此確認(rèn)可使用的端口。雖然其本身并不是惡意的網(wǎng)絡(luò)活動(dòng),但也是網(wǎng)絡(luò)攻擊者探測(cè)目標(biāo)主機(jī)服務(wù),以利用該服務(wù)的已知漏洞的重要手段。
TCP SYN掃描是端口掃描眾多方式中的一種,其他方式包括TCP掃描,UDP掃描,ACK掃描,窗口掃描和FIN掃描等。
TCP SYN掃描是另一種TCP掃描。端口掃描工具不使用操作系統(tǒng)原生網(wǎng)絡(luò)功能,而是自行生成、發(fā)送IP數(shù)據(jù)包,并監(jiān)控其回應(yīng)。這種掃描模式被稱(chēng)為“半開(kāi)放掃描”,因?yàn)樗鼜牟唤⑼暾腡CP連接。端口掃描工具生成一個(gè)SYN包,如果目標(biāo)端口開(kāi)放,則會(huì)返回SYN-ACK包。掃描端回應(yīng)一個(gè)RST包,然后在握手完成前關(guān)閉連接。如果端口關(guān)閉了但未使用過(guò)濾,目標(biāo)端口應(yīng)該會(huì)持續(xù)返回RST包。
TCP SYN掃描優(yōu)點(diǎn):
給掃描工具全權(quán)控制數(shù)據(jù)包發(fā)送和等待回應(yīng)時(shí)長(zhǎng)的權(quán)力,允許更詳細(xì)的回應(yīng)分析。
SYN掃描從不會(huì)建立完整的連接。
2. python 代碼
使用raw socket進(jìn)行SYN 洪泛,封裝多個(gè)函數(shù)使其模塊化和易于理解。利用結(jié)構(gòu)體可以方便的使用格式化字符串和變量列表來(lái)編碼數(shù)據(jù)包。
- /bin/env python
- # -*- coding: UTF-8 -*-
- # 必須以root權(quán)限運(yùn)行
- import socket
- import sys
- import time
- from struct import *
- # 計(jì)算校驗(yàn)和
- def checksum(msg):
- s = 0
- # 每次取2個(gè)字節(jié)
- for i in range(0,len(msg),2):
- w = (ord(msg[i]) << 8) + (ord(msg[i+1]))
- s = s+w
- s = (s>>16) + (s & 0xffff)
- s = ~s & 0xffff
- return s
- def CreateSocket(source_ip,dest_ip):
- try:
- s = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.IPPROTO_TCP)
- except socket.error, msg:
- print 'Socket create error: ',str(msg[0]),'message: ',msg[1]
- sys.exit()
- # 設(shè)置手工提供IP頭部
- s.setsockopt(socket.IPPROTO_TCP, socket.IP_HDRINCL, 1)
- return s
- # 創(chuàng)建IP頭部
- def CreateIpHeader(source_ip, dest_ip):
- packet = ''
- # ip 頭部選項(xiàng)
- headerlen = 5
- version = 4
- tos = 0
- tot_len = 20 + 20
- id = random.randrange(18000,65535,1)
- frag_off = 0
- ttl = 255
- protocol = socket.IPPROTO_TCP
- check = 10
- saddr = socket.inet_aton ( source_ip )
- daddr = socket.inet_aton ( dest_ip )
- hl_version = (version << 4) + headerlen
- ip_header = pack('!BBHHHBBH4s4s', hl_version, tos, tot_len, id, frag_off, ttl, protocol, check, saddr, daddr)
- return ip_header
- # 創(chuàng)建TCP頭部
- def create_tcp_syn_header(source_ip, dest_ip, dest_port):
- # tcp 頭部選項(xiàng)
- source = random.randrange(32000,62000,1) # 隨機(jī)化一個(gè)源端口
- seq = 0
- ack_seq = 0
- doff = 5
- # tcp flags
- fin = 0
- syn = 1
- rst = 0
- psh = 0
- ack = 0
- urg = 0
- window = socket.htons (8192) # 最大窗口大小
- check = 0
- urg_ptr = 0
- offset_res = (doff << 4) + 0
- tcp_flags = fin + (syn<<1) + (rst<<2) + (psh<<3) + (ack<<4) + (urg<<5)
- tcp_header = pack('!HHLLBBHHH', source, dest_port, seq, ack_seq, offset_res, tcp_flags, window, check, urg_ptr)
- # 偽頭部選項(xiàng)
- source_address = socket.inet_aton( source_ip )
- dest_address = socket.inet_aton( dest_ip )
- placeholder = 0
- protocol = socket.IPPROTO_TCP
- tcp_length = len(tcp_header)
- psh = pack('!4s4sBBH', source_address, dest_address, placeholder, protocol, tcp_length);
- psh = psh + tcp_header;
- tcp_checksum = checksum(psh)
- # 重新打包TCP頭部,并填充正確地校驗(yàn)和
- tcp_header = pack('!HHLLBBHHH', source, dest_port, seq, ack_seq, offset_res, tcp_flags, window, tcp_checksum, urg_ptr)
- return tcp_header
- def range_scan(source_ip, dest_ip, start_port, end_port) :
- syn_ack_received = [] # 開(kāi)放端口存儲(chǔ)列表
- for j in range (start_port, end_port) :
- s = CreateSocket(source_ip, dest_ip)
- ip_header = CreateIpHeader(source_ip, dest_ip)
- tcp_header = create_tcp_syn_header(source_ip, dest_ip,j)
- packet = ip_header + tcp_header
- s.sendto(packet, (dest_ip, 0))
- data = s.recvfrom(1024) [0][0:]
- ip_header_len = (ord(data[0]) & 0x0f) * 4
- ip_header_ret = data[0: ip_header_len - 1]
- tcp_header_len = (ord(data[32]) & 0xf0)>>2
- tcp_header_ret = data[ip_header_len:ip_header_len+tcp_header_len - 1]
- if ord(tcp_header_ret[13]) == 0x12: # SYN/ACK flags
- syn_ack_received.append(j)
- return syn_ack_received
- # 程序從這里開(kāi)始:
- open_port_list = []
- ipsource = '192.168.1.95'
- ipdest = '192.168.1.31'
- start = 100
- stop = 450
- step = (stop-start)/10
- scan_ports = range(start, stop, step)
- if scan_ports[len(scan_ports)-1] < stop:
- scan_ports.append(stop)
- for i in range(len(scan_ports)-1):
- opl = range_scan(ipsource, ipdest, scan_ports[i], scan_ports[i+1])
- open_port_list.append(opl)
- for i in range(len(open_port_list)):
- print 'Process #: ',i,' Open ports: ',open_port_list[i]
- print 'A list of all open ports found: '
- for i in range(len(open_port_list)):
- for j in range(len(open_port_list[i])):
- print open_port_list[i][j],', '