#!/usr/bin/python # # Simple UDP scanner determining whether scanned host replies with # ICMP Desitnation Unreachable upon receiving UDP packet on some high, closed port. # # Based on "Black Hat Python" book by Justin Seitz. # # Mariusz B. # import os import sys import time import ctypes import struct import socket import threading from datetime import datetime try: from netaddr import IPNetwork, IPAddress except ImportError: print('[!] No module named "netaddr". Please type:\n\tpip install netaddr') sys.exit(1) DEBUG = False # Ports that will be used during scanning, considered as most likely closed ports. SCAN_PORTS = range(65212, 65220) HOSTS_UP = set() MAGIC_MESSAGE = '\xec\xcb\x5c\x6f\x41\xbe\x2e\x71\x9e\xd1' class ICMP(ctypes.Structure): _fields_ = [ ('type', ctypes.c_ubyte), ('code', ctypes.c_ubyte), ('chksum', ctypes.c_ushort), ('unused', ctypes.c_ushort), ('nexthop', ctypes.c_ushort) ] def __new__(self, sockBuff = None): return self.from_buffer_copy(sockBuff) def __init__(self, sockBuff = None): self.types_map = { 0:'Echo Reply',1:'Unassigned',2:'Unassigned ',3:'Destination Unreachable', 4:'Source Quench',5:'Redirect',6:'Alternate Host Address',7:'Unassigned', 8:'Echo',9:'Router Advertisement',10:'Router Solicitation',11:'Time Exceeded', 12:'Parameter Problem',13:'Timestamp',14:'Timestamp Reply',15:'Information Request', 16:'Information Reply',17:'Address Mask Request',18:'Address Mask Reply', 30:'Traceroute',31:'Datagram Conversion Error',32:'Mobile Host Redirect', 33:'IPv6 Where-Are-You',34:'IPv6 I-Am-Here',35:'Mobile Registration Request', 36:'Mobile Registration Reply',37:'Domain Name Request',38:'Domain Name Reply', 39:'SKIP',40:'Photuris' } # Human readable protocol try: self.message = self.types_map[self.type] except: self.message = str('') # # IPv4 packet structure definition in ctypes. # class IP(ctypes.Structure): _fields_ = [ ('ihl', ctypes.c_ubyte, 4), ('version', ctypes.c_ubyte, 4), ('tos', ctypes.c_ubyte), ('len', ctypes.c_ushort), ('id', ctypes.c_ushort), ('offset', ctypes.c_ushort), ('ttl', ctypes.c_ubyte), ('protocol_num', ctypes.c_ubyte), ('sum', ctypes.c_ushort), ('src', ctypes.c_uint), ('dst', ctypes.c_uint) ] def __new__(self, socketBuffer = None): return self.from_buffer_copy(socketBuffer) def __init__(self, socketBuffer = None): # Map protocol constants to their names. self.protocol_map = { 0:'HOPOPT',1:'ICMP',2:'IGMP',3:'GGP',4:'IPv4',5:'ST',6:'TCP',7:'CBT',8:'EGP', 9:'IGP',10:'BBN-RCC-MON',11:'NVP-II',12:'PUP',13:'ARGUS',14:'EMCON',15:'XNET',16:'CHAOS', 17:'UDP',18:'MUX',19:'DCN-MEAS',20:'HMP',21:'PRM',22:'XNS-IDP',23:'TRUNK-1',24:'TRUNK-2', 25:'LEAF-1',26:'LEAF-2',27:'RDP',28:'IRTP',29:'ISO-TP4',30:'NETBLT',31:'MFE-NSP',32:'MERIT-INP', 33:'DCCP',34:'3PC',35:'IDPR',36:'XTP',37:'DDP',38:'IDPR-CMTP',39:'TP++',40:'IL', 41:'IPv6',42:'SDRP',43:'IPv6-Route',44:'IPv6-Frag',45:'IDRP',46:'RSVP',47:'GRE',48:'DSR', 49:'BNA',50:'ESP',51:'AH',52:'I-NLSP',53:'SWIPE',54:'NARP',55:'MOBILE',56:'TLSP', 57:'SKIP',58:'IPv6-ICMP',59:'IPv6-NoNxt',60:'IPv6-Opts',62:'CFTP',64:'SAT-EXPAK', 65:'KRYPTOLAN',66:'RVD',67:'IPPC',69:'SAT-MON',70:'VISA',71:'IPCV',72:'CPNX', 73:'CPHB',74:'WSN',75:'PVP',76:'BR-SAT-MON',77:'SUN-ND',78:'WB-MON',79:'WB-EXPAK',80:'ISO-IP', 81:'VMTP',82:'SECURE-VMTP',83:'VINES',84:'TTP',84:'IPTM',85:'NSFNET-IGP',86:'DGP',87:'TCF',88:'EIGRP', 89:'OSPFIGP',90:'Sprite-RPC',91:'LARP',92:'MTP',93:'AX.25',94:'IPIP',95:'MICP',96:'SCC-SP', 97:'ETHERIP',98:'ENCAP',100:'GMTP',101:'IFMP',102:'PNNI',103:'PIM',104:'ARIS', 105:'SCPS',106:'QNX',107:'A/N',108:'IPComp',109:'SNP',110:'Compaq-Peer',111:'IPX-in-IP',112:'VRRP', 113:'PGM',115:'L2TP',116:'DDX',117:'IATP',118:'STP',119:'SRP',120:'UTI', 121:'SMP',122:'SM',123:'PTP',124:'ISIS',125:'FIRE',126:'CRTP',127:'CRUDP',128:'SSCOPMCE', 129:'IPLT',130:'SPS',131:'PIPE',132:'SCTP',133:'FC',134:'RSVP-E2E-IGNORE',135:'Mobility',136:'UDPLite', 137:'MPLS-in-IP',138:'manet',139:'HIP',140:'Shim6',141:'WESP',142:'ROHC' } # Human readable IP addresses. try: self.src_address = socket.inet_ntoa(struct.pack(' ') sys.exit(1) bindAddr = sys.argv[1] subnet = sys.argv[2] sockProto = None if os.name == 'nt': sockProto = socket.IPPROTO_IP else: sockProto = socket.IPPROTO_ICMP sniffer = socket.socket(socket.AF_INET, socket.SOCK_RAW, sockProto) if DEBUG: print('[.] Binding on {}:0'.format(bindAddr)) sniffer.bind((bindAddr, 0)) # Include IP headers in the capture sniffer.setsockopt(socket.IPPROTO_IP, socket.IP_HDRINCL, 1) # In Windows, set up promiscous mode. if os.name == 'nt': try: sniffer.ioctl(socket.SIO_RCVALL, socket.RCVALL_ON) except socket.error, e: print('[!] Could not set promiscous mode ON: "{}"'.format(str(e))) # Sending thread threading.Thread(target=udpSend, args=(subnet, MAGIC_MESSAGE)).start() # Receiving thread recvThread = threading.Thread(target=processPackets, args=(sniffer, subnet)) recvThread.daemon = True recvThread.start() time.sleep(15) if DEBUG: print('[.] Breaking response wait loop.') # Turn off promiscous mode if os.name == 'nt': try: sniffer.ioctl(socket.SIO_RCVALL, socket.RCVALL_OFF) except socket.error, e: pass if __name__ == '__main__': main(sys.argv)