2013-08-16 11:12:47 -04:00
|
|
|
/*
|
|
|
|
* ZMap Copyright 2013 Regents of the University of Michigan
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may not
|
|
|
|
* use this file except in compliance with the License. You may obtain a copy
|
|
|
|
* of the License at http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*/
|
|
|
|
|
|
|
|
// probe module for performing TCP SYN scans
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <string.h>
|
2013-08-19 03:02:52 -04:00
|
|
|
#include <assert.h>
|
2013-08-16 11:12:47 -04:00
|
|
|
|
|
|
|
#include <netinet/ip.h>
|
|
|
|
#include <netinet/tcp.h>
|
|
|
|
#include <netinet/ether.h>
|
|
|
|
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
2013-08-19 03:02:52 -04:00
|
|
|
#include "../fieldset.h"
|
2013-08-16 11:12:47 -04:00
|
|
|
#include "probe_modules.h"
|
|
|
|
#include "packet.h"
|
|
|
|
|
|
|
|
probe_module_t module_tcp_synscan;
|
2013-08-18 23:36:57 -04:00
|
|
|
static uint32_t num_ports;
|
|
|
|
|
|
|
|
int synscan_global_initialize(struct state_conf *state)
|
|
|
|
{
|
|
|
|
num_ports = state->source_port_last - state->source_port_first + 1;
|
|
|
|
return EXIT_SUCCESS;
|
|
|
|
}
|
2013-08-16 11:12:47 -04:00
|
|
|
|
|
|
|
int synscan_init_perthread(void* buf, macaddr_t *src,
|
|
|
|
macaddr_t *gw, port_h_t dst_port)
|
|
|
|
{
|
|
|
|
memset(buf, 0, MAX_PACKET_SIZE);
|
|
|
|
struct ethhdr *eth_header = (struct ethhdr *)buf;
|
|
|
|
make_eth_header(eth_header, src, gw);
|
|
|
|
struct iphdr *ip_header = (struct iphdr*)(ð_header[1]);
|
|
|
|
uint16_t len = htons(sizeof(struct iphdr) + sizeof(struct tcphdr));
|
|
|
|
make_ip_header(ip_header, IPPROTO_TCP, len);
|
|
|
|
struct tcphdr *tcp_header = (struct tcphdr*)(&ip_header[1]);
|
|
|
|
make_tcp_header(tcp_header, dst_port);
|
|
|
|
return EXIT_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
int synscan_make_packet(void *buf, ipaddr_n_t src_ip, ipaddr_n_t dst_ip,
|
|
|
|
uint32_t *validation, int probe_num)
|
|
|
|
{
|
|
|
|
struct ethhdr *eth_header = (struct ethhdr *)buf;
|
|
|
|
struct iphdr *ip_header = (struct iphdr*)(ð_header[1]);
|
|
|
|
struct tcphdr *tcp_header = (struct tcphdr*)(&ip_header[1]);
|
|
|
|
uint32_t tcp_seq = validation[0];
|
|
|
|
|
|
|
|
ip_header->saddr = src_ip;
|
|
|
|
ip_header->daddr = dst_ip;
|
|
|
|
|
2013-08-18 23:36:57 -04:00
|
|
|
tcp_header->source = htons(get_src_port(num_ports,
|
|
|
|
probe_num, validation));
|
2013-08-16 11:12:47 -04:00
|
|
|
tcp_header->seq = tcp_seq;
|
|
|
|
tcp_header->check = 0;
|
|
|
|
tcp_header->check = tcp_checksum(sizeof(struct tcphdr),
|
|
|
|
ip_header->saddr, ip_header->daddr, tcp_header);
|
|
|
|
|
|
|
|
ip_header->check = 0;
|
|
|
|
ip_header->check = ip_checksum((unsigned short *) ip_header);
|
|
|
|
|
|
|
|
return EXIT_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
void synscan_print_packet(FILE *fp, void* packet)
|
|
|
|
{
|
|
|
|
struct ethhdr *ethh = (struct ethhdr *) packet;
|
|
|
|
struct iphdr *iph = (struct iphdr *) ðh[1];
|
|
|
|
struct tcphdr *tcph = (struct tcphdr *) &iph[1];
|
|
|
|
fprintf(fp, "tcp { source: %u | dest: %u | seq: %u | checksum: %u }\n",
|
|
|
|
ntohs(tcph->source),
|
|
|
|
ntohs(tcph->dest),
|
|
|
|
ntohl(tcph->seq),
|
|
|
|
ntohl(tcph->check));
|
|
|
|
struct in_addr *s = (struct in_addr *) &(iph->saddr);
|
|
|
|
struct in_addr *d = (struct in_addr *) &(iph->daddr);
|
|
|
|
char srcip[20];
|
|
|
|
char dstip[20];
|
|
|
|
// inet_ntoa is a const char * so we if just call it in
|
|
|
|
// fprintf, you'll get back wrong results since we're
|
|
|
|
// calling it twice.
|
|
|
|
strncpy(srcip, inet_ntoa(*s), 19);
|
|
|
|
strncpy(dstip, inet_ntoa(*d), 19);
|
|
|
|
fprintf(fp, "ip { saddr: %s | daddr: %s | checksum: %u }\n",
|
|
|
|
srcip,
|
|
|
|
dstip,
|
|
|
|
ntohl(iph->check));
|
|
|
|
fprintf(fp, "eth { shost: %02x:%02x:%02x:%02x:%02x:%02x | "
|
|
|
|
"dhost: %02x:%02x:%02x:%02x:%02x:%02x }\n",
|
|
|
|
(int) ((unsigned char *) ethh->h_source)[0],
|
|
|
|
(int) ((unsigned char *) ethh->h_source)[1],
|
|
|
|
(int) ((unsigned char *) ethh->h_source)[2],
|
|
|
|
(int) ((unsigned char *) ethh->h_source)[3],
|
|
|
|
(int) ((unsigned char *) ethh->h_source)[4],
|
|
|
|
(int) ((unsigned char *) ethh->h_source)[5],
|
|
|
|
(int) ((unsigned char *) ethh->h_dest)[0],
|
|
|
|
(int) ((unsigned char *) ethh->h_dest)[1],
|
|
|
|
(int) ((unsigned char *) ethh->h_dest)[2],
|
|
|
|
(int) ((unsigned char *) ethh->h_dest)[3],
|
|
|
|
(int) ((unsigned char *) ethh->h_dest)[4],
|
|
|
|
(int) ((unsigned char *) ethh->h_dest)[5]);
|
|
|
|
fprintf(fp, "------------------------------------------------------\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
int synscan_validate_packet(const struct iphdr *ip_hdr, uint32_t len,
|
|
|
|
__attribute__((unused))uint32_t *src_ip, uint32_t *validation)
|
|
|
|
{
|
|
|
|
if (ip_hdr->protocol != IPPROTO_TCP) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((4*ip_hdr->ihl + sizeof(struct tcphdr)) > len) {
|
|
|
|
// buffer not large enough to contain expected tcp header
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
struct tcphdr *tcp = (struct tcphdr*)((char *)ip_hdr + 4*ip_hdr->ihl);
|
|
|
|
uint16_t sport = tcp->source;
|
|
|
|
uint16_t dport = tcp->dest;
|
|
|
|
|
|
|
|
// validate source port
|
|
|
|
if (ntohs(sport) != zconf.target_port) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
// validate destination port
|
2013-08-18 23:36:57 -04:00
|
|
|
if (!check_dst_port(ntohs(dport), num_ports, validation)) {
|
2013-08-16 11:12:47 -04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
// validate tcp acknowledgement number
|
|
|
|
if (htonl(tcp->ack_seq) != htonl(validation[0])+1) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2013-08-19 03:02:52 -04:00
|
|
|
void fs_add_sys_fields(fieldset_t *fs)
|
|
|
|
{
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
char *make_ip_str(uint32_t ip)
|
|
|
|
{
|
|
|
|
struct in_addr t;
|
|
|
|
t.saddr = ip;
|
|
|
|
const char *temp = inet_ntoa(t);
|
|
|
|
char *retv = malloc(strlen(temp)+1);
|
|
|
|
assert (retv);
|
|
|
|
strcpy(retv, temp);
|
|
|
|
return retv;
|
|
|
|
}
|
|
|
|
|
|
|
|
void fs_add_ip_fields(fieldset_t *fs, struct iphdr *ip)
|
|
|
|
{
|
|
|
|
fs_add_string(fs, "saddr", make_ip_str(ip->saddr), 1);
|
|
|
|
fs_add_string(fs, "daddr", make_ip_str(ip->daddr), 1);
|
|
|
|
fs_add_uint64(fs, "ipid", ntohl(ip->id);
|
|
|
|
fs_add_uint64(fs, "ttl", ntohl(ip->ttl);
|
|
|
|
}
|
|
|
|
|
|
|
|
void synscan_process_packet(const u_char *packet,
|
|
|
|
__attribute__((unused)) uint32_t len, fieldset_t *fs)
|
|
|
|
{
|
|
|
|
struct iphdr *ip_hdr = (struct iphdr *)&packet[sizeof(struct ethhdr)];
|
|
|
|
struct tcphdr *tcp = (struct tcphdr*)((char *)ip_hdr
|
|
|
|
+ (sizeof(struct iphdr)));
|
|
|
|
|
|
|
|
fs_add_uint64(fs, "sport", (uint64_t) ntohs(tcp->source));
|
|
|
|
fs_add_uint64(fs, "dport", (uint64_t) ntohs(tcp->dest));
|
|
|
|
fs_add_uint64(fs, "seqnum", (uint64_t) ntohs(tcp->seq));
|
|
|
|
fs_add_uint64(fs, "acknum", (uint64_t) ntohl(tcp->ack_seq));
|
|
|
|
fs_add_uint64(fs, "window", (uint64_t) ntohs(tcp->window));
|
|
|
|
|
|
|
|
if (tcp->rst) { // RST packet
|
|
|
|
fs_add_string(fs, "classification", "rst", 0);
|
|
|
|
fs_add_uint64(fs, "success", 0);
|
|
|
|
} else { // SYNACK packet
|
|
|
|
fs_add_string(fs, "classification", "synack", 0);
|
|
|
|
fs_add_uint64(fs, "success", 1);
|
2013-08-16 11:12:47 -04:00
|
|
|
}
|
2013-08-19 03:02:52 -04:00
|
|
|
return
|
|
|
|
}
|
2013-08-16 11:12:47 -04:00
|
|
|
|
|
|
|
probe_module_t module_tcp_synscan = {
|
|
|
|
.name = "tcp_synscan",
|
|
|
|
.packet_length = 54,
|
|
|
|
.pcap_filter = "tcp && tcp[13] & 4 != 0 || tcp[13] == 18",
|
|
|
|
.pcap_snaplen = 96,
|
|
|
|
.port_args = 1,
|
2013-08-18 23:36:57 -04:00
|
|
|
.global_initialize = &synscan_global_initialize,
|
2013-08-16 11:12:47 -04:00
|
|
|
.thread_initialize = &synscan_init_perthread,
|
|
|
|
.make_packet = &synscan_make_packet,
|
|
|
|
.print_packet = &synscan_print_packet,
|
2013-08-19 03:02:52 -04:00
|
|
|
.process_packet = &synscan_process_packet,
|
2013-08-16 11:12:47 -04:00
|
|
|
.validate_packet = &synscan_validate_packet,
|
|
|
|
.close = NULL,
|
2013-08-19 03:02:52 -04:00
|
|
|
.fields = {
|
|
|
|
{.name = "sport", .type = "int", .desc = "TCP source port"},
|
|
|
|
{.name = "dport", .type = "int", .desc = "TCP destination port"},
|
|
|
|
{.name = "seqnum", .type = "int", .desc = "TCP sequence number"},
|
|
|
|
{.name = "acknum", .type = "int", .desc = "TCP acknowledgement number"},
|
|
|
|
{.name = "window", .type = "int", .desc = "TCP window"},
|
|
|
|
}
|
2013-08-16 11:12:47 -04:00
|
|
|
};
|
|
|
|
|