博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
基于Go Packet实现网络数据包的捕获与分析
阅读量:6227 次
发布时间:2019-06-21

本文共 8520 字,大约阅读时间需要 28 分钟。

hot3.png

What is Packet Capturing

Packet capture is a computer networking term for intercepting a data packet that is crossing or moving over a specific computer network.Once a packet is captured, it is stored temporarily so that it can be analyzed. The packet is inspected to help diagnose and solve network problems and determine whether network security policies are being followed.

Packet Capture Overview

How can it be used

  • Development Testing & validating & Reverse engineer APP on API

  • Network Administration Seeing what traffic goes on in background,Looking for malicious traffic on networkData capturing is used to identify security flaws and breaches by determining the point of intrusion.

  • Troubleshooting Managed through data capturing, troubleshooting detects the occurrence of undesired events over a network and helps solve them. If the network administrator has full access to a network resource, he can access it remotely and troubleshoot any issues.

  • Security defcon Wall of Sheep.Hackers can also use packet capturing techniques to steal data that is being transmitted over a network, like Stealing credentials.When data is stolen, the network administrator can retrieve the stolen or lost information easily using data capturing techniques.

  • Forensics forensics for crime investigations.Whenever viruses, worms or other intrusions are detected in computers, the network administrator determines the extent of the problem. After initial analysis, she may block some segments and network traffic in order to save historical information and network data.

<!-- more -->

What is libpcap

libpcap flow involving data copy from kernel to user space.

//Compile with: gcc find_device.c -lpcap#include 
#include
int main(int argc, char \*\*argv) { char \*device; char error_buffer[PCAP_ERRBUF_SIZE]; //Find a device device = pcap_lookupdev(error_buffer); if (device == NULL) { printf("Error finding device: %s\n", error_buffer); return 1; } printf("Network device found: %s\n", device); return 0;}
#include 
#include
#include
#include
#include
void print_packet_info(const u_char \*packet, struct pcap_pkthdr packet_header);int main(int argc, char \*argv[]) { char \*device; char error_buffer[PCAP_ERRBUF_SIZE]; pcap_t *handle; const u_char *packet; struct pcap_pkthdr packet_header; int packet_count_limit = 1; int timeout_limit = 10000; /*In milliseconds*/ device = pcap_lookupdev(error_buffer); if (device == NULL) { printf("Error finding device: %s\n", error_buffer); return 1; } /*Open device for live capture*/ handle = pcap_open_live( device, BUFSIZ, packet_count_limit, timeout_limit, error_buffer ); /*Attempt to capture one packet. If there is no network traffic and the timeout is reached, it will return NULL*/ packet = pcap_next(handle, &packet_header); if (packet == NULL) { printf("No packet found.\n"); return 2; } /*Our function to output some info*/ print_packet_info(packet, packet_header); return 0;}void print_packet_info(const u_char \*packet, struct pcap_pkthdr packet_header) { printf("Packet capture length: %d\n", packet_header.caplen); printf("Packet total length %d\n", packet_header.len);}

Debug Tools

#Older versions of tcpdump truncate packets to 68 or 96 bytes.#If this is the case, use -s to capture full-sized packets:$ tcpdump -i 
-s 65535 -w
# A packet capturing tool similar to TcpDump for Solaris$ snoop -r -o arp11.snoop -q -d nxge0 -c 150000

tcpdump

tcpdump 是一个运行在命令行下的嗅探工具。它允许用户拦截和显示发送或收到过网络连接到该计算机的TCP/IP和其他数据包。它支持针对网络层、协议、主机、网络或端口的过滤,并提供and、or、not等逻辑语句来帮助你去掉无用的信息,从而使用户能够进一步找出问题的根源。可以使用BPF来限制tcpdump产生的数据包数量。

snoop

snoop uses both the network packet filter and streams buffer modules to provide efficient capture of packets from the network. Captured packets can be displayed as they are received, or saved to a file for later inspection.

promiscuous mode

抓包工具需要工作在promiscuous mode(混杂模式)(superuser), 指一台机器的网卡能够接收所有经过它的数据流,而不论其目的地址是否是它。当网卡工作在混杂模式下时,网卡将来自接口的所有数据都捕获并交给相应的驱动程序。一般在分析网络数据作为网络故障诊断手段时用到,同时这个模式也被网络黑客利用来作为网络数据窃听的入口。

BPF

Berkeley Packet Filter,缩写BPF,是类Unix系统上数据链路层的一种接口,提供原始链路层封包的收发。BPF支持“过滤”封包,这样BPF会只把“感兴趣”的封包到上层软件,可以避免从操作系统内核向用户态复制其他封包,降低抓包的CPU的负担以及所需的缓冲区空间,从而减少丢包率。BPF的过滤功能是以BPF虚拟机机器语言的解释器的形式实现的,这种语言的程序可以抓取封包数据,对封包中的数据采取算术操作,并将结果与常量或封包中的数据或结果中的测试位比较,根据比较的结果决定接受还是拒绝封包。

BPF Overview

Go Packet

Find Devices

package mainimport (	"fmt"	"log"	"github.com/google/gopacket"	"github.com/google/gopacket/layers"	"github.com/google/gopacket/pcap")func main() {	fmt.Println("----------Find all devices---------\n ")	devices, err := pcap.FindAllDevs()	if err != nil {		log.Fatal(err)	}	// Print device information	for _, device := range devices {		for _, address := range device.Addresses {			fmt.Println("- IP address: ", address.IP)			fmt.Println("- Subnet mask: ", address.Netmask)		}	}	/*- IP address:  45.33.110.101	  - Subnet mask:  ffffff00	  - IP address:  2600:3c01::f03c:91ff:fee5:45b6	  - Subnet mask:  ffffffffffffffff0000000000000000	  - IP address:  fe80::f03c:91ff:fee5:45b6	  - Subnet mask:  ffffffffffffffff0000000000000000	  - IP address:  127.0.0.1	  - Subnet mask:  ff000000	  - IP address:  ::1	  - Subnet mask:  ffffffffffffffffffffffffffffffff	*/

Decoding Packet Layers

Capture Packet Workflow

  • Getting a list of network devices
  • Capturing packets from a network device
  • Analyzing packet layers
  • Using Berkeley Packet Filters
package mainimport (	"fmt"	"log"	"net"	"github.com/google/gopacket"	"github.com/google/gopacket/layers"	"github.com/google/gopacket/pcap")func main(){	handle, err := pcap.OpenLive("eth0", 65536, true, pcap.BlockForever)	if err != nil {		fmt.Printf("Error: %s\n", err)		return	}	defer handle.Close()	//Create a new PacketDataSource	src := gopacket.NewPacketSource(handle, layers.LayerTypeEthernet)	//Packets returns a channel of packets	in := src.Packets()	for {		var packet gopacket.Packet		select {		//case <-stop:		//return		case packet = <-in:			arpLayer := packet.Layer(layers.LayerTypeARP)			if arpLayer == nil {				continue			}			arp := arpLayer.(*layers.ARP)			if net.HardwareAddr(arp.SourceHwAddress).String() == "abc" {				//Do something or don't			}			tcpLayer := packet.Layer(layers.LayerTypeTCP)			if tcpLayer == nil {				continue			}			tcp := tcpLayer.(*layers.TCP)			//.......		}	}}

Creating and Sending Packets

package mainimport (    "github.com/google/gopacket"    "github.com/google/gopacket/layers"    "github.com/google/gopacket/pcap"    "log"    "net"    "time")var (    device       string = "eth0"    snapshot_len int32  = 1024    promiscuous  bool   = false    err          error    timeout      time.Duration = 30 * time.Second    handle       *pcap.Handle    buffer       gopacket.SerializeBuffer    options      gopacket.SerializeOptions)func main() {    // Open device    handle, err = pcap.OpenLive(device, snapshot_len, promiscuous, timeout)    if err != nil {log.Fatal(err) }    defer handle.Close()    // Send raw bytes over wire    rawBytes := []byte{10, 20, 30}    err = handle.WritePacketData(rawBytes)    if err != nil {        log.Fatal(err)    }    // Create a properly formed packet, just with    // empty details. Should fill out MAC addresses,    // IP addresses, etc.    buffer = gopacket.NewSerializeBuffer()    gopacket.SerializeLayers(buffer, options,        &layers.Ethernet{},        &layers.IPv4{},        &layers.TCP{},        gopacket.Payload(rawBytes),    )    outgoingPacket := buffer.Bytes()    // Send our packet    err = handle.WritePacketData(outgoingPacket)    if err != nil {        log.Fatal(err)    }    // This time lets fill out some information    ipLayer := &layers.IPv4{        SrcIP: net.IP{127, 0, 0, 1},        DstIP: net.IP{8, 8, 8, 8},    }    ethernetLayer := &layers.Ethernet{        SrcMAC: net.HardwareAddr{0xFF, 0xAA, 0xFA, 0xAA, 0xFF, 0xAA},        DstMAC: net.HardwareAddr{0xBD, 0xBD, 0xBD, 0xBD, 0xBD, 0xBD},    }    tcpLayer := &layers.TCP{        SrcPort: layers.TCPPort(4321),        DstPort: layers.TCPPort(80),    }    // And create the packet with the layers    buffer = gopacket.NewSerializeBuffer()    gopacket.SerializeLayers(buffer, options,        ethernetLayer,        ipLayer,        tcpLayer,        gopacket.Payload(rawBytes),    )    outgoingPacket = buffer.Bytes()}

Application

转载于:https://my.oschina.net/zijingshanke/blog/1031479

你可能感兴趣的文章
以太坊web3.js文档翻译及说明
查看>>
list集合练习笔记
查看>>
SqlServer2008 R2数据库主从搭建
查看>>
一个程序猿试用有道云笔记VIP功能体验
查看>>
简单对接快递100
查看>>
Etherscan以太坊API官方文档中文版
查看>>
wamp 无法打开localhost:The requested URL / was not...
查看>>
ERC827以太坊通证标准
查看>>
PropertyPlaceholderConfigurer ---Spring管理配置文件
查看>>
初学Python:写码时应该缩进使用 tab 还是空格?
查看>>
10.15 iptables filter表案例, iptables nat表应用
查看>>
java B2B2C Springboot电子商城系统-路由网关(zuul)
查看>>
重磅课程|《CNCF x Alibaba 云原生技术公开课》正式开讲!
查看>>
java反射+注解实现Entity类与Dto类相互转换
查看>>
LVM讲解和磁盘故障小案例
查看>>
年后跳槽怕面试不过关?搞懂并发编程,轻松应对80%的面试场景
查看>>
Spring Cloud 终于按捺不住推出了自己的服务网关 Gateway
查看>>
【更新】Infragistics Ultimate UI for WPF v18.2(二):分类图
查看>>
交易比特币的三种方式和购买数字资产的利弊
查看>>
干货 | 京东云部署Wordpress最佳实践
查看>>