Merge branch 'master' into feature/add-json-output
Conflicts: INSTALL
This commit is contained in:
commit
dc75ca2edd
20
INSTALL
20
INSTALL
@ -1,17 +1,23 @@
|
|||||||
ZMap is designed to run on GNU/Linux systems and can be built with
|
SYSTEM REQUIREMENTS
|
||||||
most recent versions of gcc. ZMap requires GMP, a free library for
|
|
||||||
arbitrary precision arithmetic, gengetopt, and libpcap. Currently
|
|
||||||
ZMap only supports 64-bit systems.
|
|
||||||
|
|
||||||
These packages can be installed on Debian-based systems by running:
|
ZMap is designed to run on GNU/Linux systems and can be built with
|
||||||
|
most recent versions of gcc. Currently, ZMap only supports 64-bit
|
||||||
|
systems. Running it requires at least 600 MB of free memory.
|
||||||
|
|
||||||
|
BUILDING AND INSTALLING ZMAP
|
||||||
|
|
||||||
|
ZMap requires GMP, a free library for arbitrary precision arithmetic,
|
||||||
|
gengetopt, and libpcap. These packages can be installed on
|
||||||
|
Debian-based systems by running:
|
||||||
|
|
||||||
sudo apt-get install libgmp3-dev gengetopt libpcap-dev
|
sudo apt-get install libgmp3-dev gengetopt libpcap-dev
|
||||||
|
|
||||||
or on RHEL- and Fedora-based systems by running:
|
or on RHEL- and Fedora-based systems by running:
|
||||||
|
|
||||||
sudo yum install gmp gmp-devel gengetopt libpcap-devel
|
sudo yum install gmp gmp-devel gengetopt libpcap-devel
|
||||||
|
|
||||||
Once these prerequisites have been installed, ZMap can be installed by running:
|
Once these prerequisites have been installed, ZMap can be installed
|
||||||
|
by running:
|
||||||
|
|
||||||
cd src
|
cd src
|
||||||
make
|
make
|
||||||
|
44
examples/udp-probes/README
Normal file
44
examples/udp-probes/README
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
|
||||||
|
UDP Data Probes
|
||||||
|
======
|
||||||
|
|
||||||
|
This directory contains a set of data files that can be used with the UDP probe module.
|
||||||
|
|
||||||
|
|
||||||
|
USING:
|
||||||
|
-----
|
||||||
|
|
||||||
|
$ zmap -M udp -p 137 --probe-args=file:examples/udp-probes/netbios_137.pkt
|
||||||
|
|
||||||
|
|
||||||
|
PROBES:
|
||||||
|
-----
|
||||||
|
|
||||||
|
citrix_1604.pkt This probe triggers a response from Citrix application discovery services on UDP port 1604
|
||||||
|
db2disco_523.pkt This probe triggers a response from IBM DB2 discovery services on UDP port 523
|
||||||
|
digi1_2362.pkt This probe triggers a response from Digi ADDP discovery services on UDP port 2362 (default magic)
|
||||||
|
digi2_2362.pkt This probe triggers a response from Digi ADDP discovery services on UDP port 2362 (devkit magic)
|
||||||
|
digi3_2362.pkt This probe triggers a response from Digi ADDP discovery services on UDP port 2362 (oem magic)
|
||||||
|
dns_53.pkt This probe queries for the DNS vendor and version using the BIND version TXT record over UDP port 53
|
||||||
|
ipmi_623.pkt This probe triggers a Get Channel Authentication reply from IPMI endpoints on UDP port 623
|
||||||
|
mdns_5353.pkt This probe triggers a response from mDNS/Avahi/Bonjour discovery services on UDP port 5353
|
||||||
|
mssql_1434.pkt This probe triggers a response from Microsoft SQL Server discovery services on UDP port 1434
|
||||||
|
natpmp_5351.pkt This probe triggers a response from NATPMP-enabled devices on UDP port 5351
|
||||||
|
netbios_137.pkt This probe triggers a status reply from NetBIOS services on UDP port 137
|
||||||
|
ntp_123.pkt This probe triggers a response from NTP servies on UDP port 123
|
||||||
|
pca_nq_5632.pkt This probe triggers a response from PC Anywhere services on UDP port 5632 (network query)
|
||||||
|
pca_st_5632.pkt This probe triggers a response from PC Anywhere services on UDP port 5632 (status)
|
||||||
|
portmap_111.pkt This probe triggers a response from SunRPC portmapper services on UDP port 111
|
||||||
|
sentinel_5093.pkt This probe triggers a response from the Sentinel license manager service on UDP port 5093
|
||||||
|
snmp1_161.pkt This probe queries for the system description field of SNMP v1 services using community string public over UDP port 161
|
||||||
|
snmp2_161.pkt This probe queries for the system description field of aNMP v2 services using community string public over UDP port 161
|
||||||
|
upnp_1900.pkt This probe triggers a response from UPnP SSDP services on UDP port 1900
|
||||||
|
wdbrpc_17185.pkt This probe triggers a response from VxWorks WDBRPC services on UDP port 17185
|
||||||
|
wsd_3702.pkt This probe triggers a response from WSD/DPWS services on UDP port 3702
|
||||||
|
|
||||||
|
NOTES:
|
||||||
|
-----
|
||||||
|
|
||||||
|
Most of these probes return useful data in the response. Parsing this data requires capturing the raw output
|
||||||
|
and decoding this using a protocol-specific dissector. In most cases, Wireshark is capable of decoding these
|
||||||
|
replies.
|
BIN
examples/udp-probes/citrix_1604.pkt
Executable file
BIN
examples/udp-probes/citrix_1604.pkt
Executable file
Binary file not shown.
BIN
examples/udp-probes/db2disco_523.pkt
Executable file
BIN
examples/udp-probes/db2disco_523.pkt
Executable file
Binary file not shown.
BIN
examples/udp-probes/digi1_2362.pkt
Executable file
BIN
examples/udp-probes/digi1_2362.pkt
Executable file
Binary file not shown.
BIN
examples/udp-probes/digi2_2362.pkt
Executable file
BIN
examples/udp-probes/digi2_2362.pkt
Executable file
Binary file not shown.
BIN
examples/udp-probes/digi3_2362.pkt
Executable file
BIN
examples/udp-probes/digi3_2362.pkt
Executable file
Binary file not shown.
BIN
examples/udp-probes/dns_53.pkt
Executable file
BIN
examples/udp-probes/dns_53.pkt
Executable file
Binary file not shown.
BIN
examples/udp-probes/ipmi_623.pkt
Executable file
BIN
examples/udp-probes/ipmi_623.pkt
Executable file
Binary file not shown.
BIN
examples/udp-probes/mdns_5353.pkt
Executable file
BIN
examples/udp-probes/mdns_5353.pkt
Executable file
Binary file not shown.
1
examples/udp-probes/mssql_1434.pkt
Executable file
1
examples/udp-probes/mssql_1434.pkt
Executable file
@ -0,0 +1 @@
|
|||||||
|
|
BIN
examples/udp-probes/natpmp_5351.pkt
Executable file
BIN
examples/udp-probes/natpmp_5351.pkt
Executable file
Binary file not shown.
BIN
examples/udp-probes/netbios_137.pkt
Executable file
BIN
examples/udp-probes/netbios_137.pkt
Executable file
Binary file not shown.
BIN
examples/udp-probes/ntp_123.pkt
Executable file
BIN
examples/udp-probes/ntp_123.pkt
Executable file
Binary file not shown.
1
examples/udp-probes/pca_nq_5632.pkt
Executable file
1
examples/udp-probes/pca_nq_5632.pkt
Executable file
@ -0,0 +1 @@
|
|||||||
|
NQ
|
1
examples/udp-probes/pca_st_5632.pkt
Executable file
1
examples/udp-probes/pca_st_5632.pkt
Executable file
@ -0,0 +1 @@
|
|||||||
|
ST
|
BIN
examples/udp-probes/portmap_111.pkt
Executable file
BIN
examples/udp-probes/portmap_111.pkt
Executable file
Binary file not shown.
BIN
examples/udp-probes/sentinel_5093.pkt
Executable file
BIN
examples/udp-probes/sentinel_5093.pkt
Executable file
Binary file not shown.
BIN
examples/udp-probes/snmp1_161.pkt
Executable file
BIN
examples/udp-probes/snmp1_161.pkt
Executable file
Binary file not shown.
BIN
examples/udp-probes/snmp2_161.pkt
Executable file
BIN
examples/udp-probes/snmp2_161.pkt
Executable file
Binary file not shown.
7
examples/udp-probes/upnp_1900.pkt
Executable file
7
examples/udp-probes/upnp_1900.pkt
Executable file
@ -0,0 +1,7 @@
|
|||||||
|
M-SEARCH * HTTP/1.1
|
||||||
|
Host:239.255.255.250:1900
|
||||||
|
ST:upnp:rootdevice
|
||||||
|
Man:"ssdp:discover"
|
||||||
|
MX:3
|
||||||
|
|
||||||
|
|
BIN
examples/udp-probes/wdbrpc_17185.pkt
Executable file
BIN
examples/udp-probes/wdbrpc_17185.pkt
Executable file
Binary file not shown.
3
examples/udp-probes/wsd_3702.pkt
Executable file
3
examples/udp-probes/wsd_3702.pkt
Executable file
@ -0,0 +1,3 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope" xmlns:wsa="http://schemas.xmlsoap.org/ws/2004/08/addressing" xmlns:wsd="http://schemas.xmlsoap.org/ws/2005/04/discovery" xmlns:wsdp="http://schemas.xmlsoap.org/ws/2006/02/devprof">
|
||||||
|
<soap:Header><wsa:To>urn:schemas-xmlsoap-org:ws:2005:04:discovery</wsa:To><wsa:Action>http://schemas.xmlsoap.org/ws/2005/04/discovery/Probe</wsa:Action><wsa:MessageID>urn:uuid:ce04dad0-5d2c-4026-9146-1aabfc1e4111</wsa:MessageID></soap:Header><soap:Body><wsd:Probe><wsd:Types>wsdp:Device</wsd:Types></wsd:Probe></soap:Body></soap:Envelope>
|
@ -18,7 +18,6 @@ extern output_module_t module_extended_file;
|
|||||||
|
|
||||||
#ifdef REDIS
|
#ifdef REDIS
|
||||||
extern output_module_t module_redis;
|
extern output_module_t module_redis;
|
||||||
extern output_module_t module_ssldbfeed;
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef JSON
|
#ifdef JSON
|
||||||
@ -30,7 +29,6 @@ output_module_t* output_modules[] = {
|
|||||||
&module_extended_file,
|
&module_extended_file,
|
||||||
#ifdef REDIS
|
#ifdef REDIS
|
||||||
&module_redis,
|
&module_redis,
|
||||||
&module_ssldbfeed,
|
|
||||||
#endif
|
#endif
|
||||||
#ifdef JSON
|
#ifdef JSON
|
||||||
&module_json_file,
|
&module_json_file,
|
||||||
|
@ -25,12 +25,111 @@
|
|||||||
|
|
||||||
#include "probe_modules.h"
|
#include "probe_modules.h"
|
||||||
#include "packet.h"
|
#include "packet.h"
|
||||||
|
#include "logger.h"
|
||||||
|
|
||||||
|
#define MAX_UDP_PAYLOAD_LEN 1472
|
||||||
|
|
||||||
|
char *udp_send_msg = NULL; // Must be null-terminated
|
||||||
|
int udp_send_msg_len = 0;
|
||||||
|
|
||||||
|
const char *udp_send_msg_default = "GET / HTTP/1.1\r\n\r\n";
|
||||||
|
|
||||||
const char *udp_send_msg = "GET / HTTP/1.1\r\n\r\n"; // Must be null-terminated
|
|
||||||
static int num_ports = 1;
|
static int num_ports = 1;
|
||||||
|
|
||||||
probe_module_t module_udp;
|
probe_module_t module_udp;
|
||||||
|
|
||||||
|
|
||||||
|
int udp_global_initialize(struct state_conf * zconf) {
|
||||||
|
char *args, *c;
|
||||||
|
int i;
|
||||||
|
unsigned int n;
|
||||||
|
|
||||||
|
FILE *inp;
|
||||||
|
|
||||||
|
udp_send_msg = strdup(udp_send_msg_default);
|
||||||
|
udp_send_msg_len = strlen(udp_send_msg);
|
||||||
|
|
||||||
|
if (! (zconf->probe_args && strlen(zconf->probe_args) > 0))
|
||||||
|
return(0);
|
||||||
|
|
||||||
|
args = strdup(zconf->probe_args);
|
||||||
|
if (! args) exit(1);
|
||||||
|
|
||||||
|
c = strchr(args, ':');
|
||||||
|
if (! c) {
|
||||||
|
free(args);
|
||||||
|
free(udp_send_msg);
|
||||||
|
log_fatal("udp", "unknown UDP probe specification (expected file:/path or text:STRING or hex:01020304)");
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
|
||||||
|
*c++ = 0;
|
||||||
|
|
||||||
|
if (strcmp(args, "text") == 0) {
|
||||||
|
udp_send_msg = strdup(c);
|
||||||
|
udp_send_msg_len = strlen(udp_send_msg);
|
||||||
|
|
||||||
|
} else if (strcmp(args, "file") == 0) {
|
||||||
|
inp = fopen(c, "rb");
|
||||||
|
if (!inp) {
|
||||||
|
free(args);
|
||||||
|
free(udp_send_msg);
|
||||||
|
log_fatal("udp", "could not open UDP data file '%s'\n", c);
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
udp_send_msg = malloc(MAX_UDP_PAYLOAD_LEN);
|
||||||
|
if (! udp_send_msg) {
|
||||||
|
free(args);
|
||||||
|
free(udp_send_msg);
|
||||||
|
log_fatal("udp", "failed to malloc payload buffer");
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
udp_send_msg_len = fread(udp_send_msg, 1, MAX_UDP_PAYLOAD_LEN, inp);
|
||||||
|
fclose(inp);
|
||||||
|
|
||||||
|
} else if (strcmp(args, "hex") == 0) {
|
||||||
|
udp_send_msg_len = strlen(c) / 2;
|
||||||
|
udp_send_msg = malloc(udp_send_msg_len);
|
||||||
|
if (! udp_send_msg) {
|
||||||
|
free(args);
|
||||||
|
free(udp_send_msg);
|
||||||
|
log_fatal("udp", "failed to malloc payload buffer");
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
|
||||||
|
for (i=0; i < udp_send_msg_len; i++) {
|
||||||
|
if (sscanf(c + (i*2), "%2x", &n) != 1) {
|
||||||
|
free(args);
|
||||||
|
free(udp_send_msg);
|
||||||
|
log_fatal("udp", "non-hex character: '%c'", c[i*2]);
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
udp_send_msg[i] = (n & 0xff);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
log_fatal("udp", "unknown UDP probe specification (expected file:/path, text:STRING, or hex:01020304)");
|
||||||
|
free(args);
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (udp_send_msg_len > MAX_UDP_PAYLOAD_LEN) {
|
||||||
|
fprintf(stderr, "warning: reducing UDP payload to %d bytes (from %d) to fit on the wire\n",
|
||||||
|
MAX_UDP_PAYLOAD_LEN, udp_send_msg_len);
|
||||||
|
udp_send_msg_len = MAX_UDP_PAYLOAD_LEN;
|
||||||
|
}
|
||||||
|
free(args);
|
||||||
|
return(0);
|
||||||
|
}
|
||||||
|
|
||||||
|
int udp_global_cleanup(__attribute__((unused)) struct state_conf *zconf,
|
||||||
|
__attribute__((unused)) struct state_send *zsend,
|
||||||
|
__attribute__((unused)) struct state_recv *zrecv) {
|
||||||
|
if (udp_send_msg) free(udp_send_msg);
|
||||||
|
udp_send_msg = NULL;
|
||||||
|
return(0);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
int udp_init_perthread(void* buf, macaddr_t *src,
|
int udp_init_perthread(void* buf, macaddr_t *src,
|
||||||
macaddr_t *gw, __attribute__((unused)) port_h_t dst_port)
|
macaddr_t *gw, __attribute__((unused)) port_h_t dst_port)
|
||||||
{
|
{
|
||||||
@ -38,20 +137,20 @@ int udp_init_perthread(void* buf, macaddr_t *src,
|
|||||||
struct ethhdr *eth_header = (struct ethhdr *)buf;
|
struct ethhdr *eth_header = (struct ethhdr *)buf;
|
||||||
make_eth_header(eth_header, src, gw);
|
make_eth_header(eth_header, src, gw);
|
||||||
struct iphdr *ip_header = (struct iphdr*)(ð_header[1]);
|
struct iphdr *ip_header = (struct iphdr*)(ð_header[1]);
|
||||||
uint16_t len = htons(sizeof(struct iphdr) + sizeof(struct udphdr) + strlen(udp_send_msg));
|
uint16_t len = htons(sizeof(struct iphdr) + sizeof(struct udphdr) + udp_send_msg_len);
|
||||||
make_ip_header(ip_header, IPPROTO_UDP, len);
|
make_ip_header(ip_header, IPPROTO_UDP, len);
|
||||||
|
|
||||||
struct udphdr *udp_header = (struct udphdr*)(&ip_header[1]);
|
struct udphdr *udp_header = (struct udphdr*)(&ip_header[1]);
|
||||||
len = sizeof(struct udphdr) + strlen(udp_send_msg);
|
len = sizeof(struct udphdr) + udp_send_msg_len;
|
||||||
make_udp_header(udp_header, zconf.target_port, len);
|
make_udp_header(udp_header, zconf.target_port, len);
|
||||||
|
|
||||||
char* payload = (char*)(&udp_header[1]);
|
char* payload = (char*)(&udp_header[1]);
|
||||||
|
|
||||||
module_udp.packet_length = sizeof(struct ethhdr) + sizeof(struct iphdr)
|
module_udp.packet_length = sizeof(struct ethhdr) + sizeof(struct iphdr)
|
||||||
+ sizeof(struct udphdr) + strlen(udp_send_msg);
|
+ sizeof(struct udphdr) + udp_send_msg_len;
|
||||||
assert(module_udp.packet_length <= MAX_PACKET_SIZE);
|
assert(module_udp.packet_length <= MAX_PACKET_SIZE);
|
||||||
|
|
||||||
strcpy(payload, udp_send_msg);
|
memcpy(payload, udp_send_msg, udp_send_msg_len);
|
||||||
|
|
||||||
num_ports = zconf.source_port_last - zconf.source_port_first + 1;
|
num_ports = zconf.source_port_last - zconf.source_port_first + 1;
|
||||||
|
|
||||||
@ -212,16 +311,17 @@ static response_type_t responses[] = {
|
|||||||
|
|
||||||
probe_module_t module_udp = {
|
probe_module_t module_udp = {
|
||||||
.name = "udp",
|
.name = "udp",
|
||||||
.packet_length = 96,
|
.packet_length = 1,
|
||||||
.pcap_filter = "udp || icmp",
|
.pcap_filter = "udp || icmp",
|
||||||
.pcap_snaplen = 96,
|
.pcap_snaplen = 1500,
|
||||||
.port_args = 1,
|
.port_args = 1,
|
||||||
.thread_initialize = &udp_init_perthread,
|
.thread_initialize = &udp_init_perthread,
|
||||||
|
.global_initialize = &udp_global_initialize,
|
||||||
.make_packet = &udp_make_packet,
|
.make_packet = &udp_make_packet,
|
||||||
.print_packet = &udp_print_packet,
|
.print_packet = &udp_print_packet,
|
||||||
.validate_packet = &udp_validate_packet,
|
.validate_packet = &udp_validate_packet,
|
||||||
.classify_packet = &udp_classify_packet,
|
.classify_packet = &udp_classify_packet,
|
||||||
.close = NULL,
|
.close = &udp_global_cleanup,
|
||||||
.responses = responses
|
.responses = responses
|
||||||
};
|
};
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user