时间:2021-05-22
我就废话不多说了,大家还是直接看代码吧!
#! /usr/bin/env pythonimport socketimport struct def checksum(data): s = 0 n = len(data) % 2 for i in range(0, len(data)-n, 2): s+= ord(data[i]) + (ord(data[i+1]) << 8) if n: s+= ord(data[i+1]) while (s >> 16): s = (s & 0xFFFF) + (s >> 16) s = ~s & 0xffff return s class ip(): def __init__(self, source, destination): self.version = 4 self.ihl = 5 # Internet Header Length self.tos = 0 # Type of Service self.tl = 0 # total length will be filled by kernel self.id = 54321 self.flags = 0 # More fragments self.offset = 0 self.ttl = 255 self.protocol = socket.IPPROTO_TCP self.checksum = 0 # will be filled by kernel self.source = socket.inet_aton(source) self.destination = socket.inet_aton(destination) def pack(self): ver_ihl = (self.version << 4) + self.ihl flags_offset = (self.flags << 13) + self.offset ip_header = struct.pack("!BBHHHBBH4s4s", ver_ihl, self.tos, self.tl, self.id, flags_offset, self.ttl, self.protocol, self.checksum, self.source, self.destination) return ip_header class tcp(): def __init__(self, srcp, dstp): self.srcp = srcp self.dstp = dstp self.seqn = 0 self.ackn = 0 self.offset = 5 # Data offset: 5x4 = 20 bytes self.reserved = 0 self.urg = 0 self.ack = 0 self.psh = 1 self.rst = 0 self.syn = 0 self.fin = 0 self.window = socket.htons(5840) self.checksum = 0 self.urgp = 0 self.payload = "" def pack(self, source, destination): data_offset = (self.offset << 4) + 0 flags = self.fin + (self.syn << 1) + (self.rst << 2) + (self.psh << 3) + (self.ack << 4) + (self.urg << 5) tcp_header = struct.pack("!HHLLBBHHH", self.srcp, self.dstp, self.seqn, self.ackn, data_offset, flags, self.window, self.checksum, self.urgp) #pseudo header fields source_ip = source destination_ip = destination reserved = 0 protocol = socket.IPPROTO_TCP total_length = len(tcp_header) + len(self.payload) # Pseudo header psh = struct.pack("!4s4sBBH", source_ip, destination_ip, reserved, protocol, total_length) psh = psh + tcp_header + self.payload tcp_checksum = checksum(psh) tcp_header = struct.pack("!HHLLBBH", self.srcp, self.dstp, self.seqn, self.ackn, data_offset, flags, self.window) tcp_header+= struct.pack("H", tcp_checksum) + struct.pack("!H", self.urgp) return tcp_header def test(source,site,data): s = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.IPPROTO_RAW) src_host=source dest_host=socket.gethostbyname(site) # IP Header ipobj=ip(src_host,dest_host) iph=ipobj.pack() # TCP Header tcpobj=tcp(1234,80) tcpobj.data_length=len(data) tcph=tcpobj.pack(ipobj.source,ipobj.destination) # Injection packet=iph+tcph+data s.sendto(packet,(dest_host,80)) s.close() if __name__ == '__main__': test("10.0.0.1","","ITS TEST")补充知识:python3 socket抓包
看代码吧!
import sockets=socket.socket(socket.AF_INET,socket.SOCK_RAW,socket.IPPROTO_TCP)while True:print(s.recvfrom(65565))以上这篇python TCP包注入方式就是小编分享给大家的全部内容了,希望能给大家一个参考,也希望大家多多支持。
声明:本页内容来源网络,仅供用户参考;我单位不保证亦不表示资料全面及准确无误,也不保证亦不表示这些资料为最新信息,如因任何原因,本网内容或者用户因倚赖本网内容造成任何损失或损害,我单位将不会负任何法律责任。如涉及版权问题,请提交至online#300.cn邮箱联系删除。
下面开始构造HTTP数据包,IP层和TCP层使用python的Impacket库,http内容自行填写。复制代码代码如下:#!/usr/bin/envpytho
本文主要是利用scapy包编写了一个简易扫描工具,支持ARP、ICMP、TCP、UDP发现扫描,支持TCPSYN、UDP端口扫描,如下:usage:python
TCP协议中的粘包问题1.粘包现象基于TCP实现一个简易远程cmd功能#服务端importsocketimportsubprocesssever=socket.
TCPClient类使用TCP从Internet资源请求数据。TCP协议建立与远程终结点的连接,然后使用此连接发送和接收数据包。TCP负责确保将数据包发送到终结
Spring的依赖注入Spring主要支持两种依赖注入方式,分别是属性注入和构造函数注入。同时也支持工厂方法注入方式。属性注入属性注入的方式非常简单,即指通过s