SQLiAttack.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256
  1. import logging
  2. import random
  3. from lea import Lea
  4. from scapy.layers.inet import Ether
  5. from scapy.utils import RawPcapReader
  6. import ID2TLib.Utility as Util
  7. from Attack import BaseAttack
  8. from Attack.AttackParameters import Parameter as Param
  9. from Attack.AttackParameters import ParameterTypes
  10. logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
  11. # noinspection PyPep8
  12. class SQLiAttack(BaseAttack.BaseAttack):
  13. template_attack_pcap_path = Util.RESOURCE_DIR + "ATutorSQLi.pcap"
  14. # HTTP port
  15. http_port = 80
  16. # Metasploit experiments show this range of ports
  17. minDefaultPort = 30000
  18. maxDefaultPort = 50000
  19. def __init__(self):
  20. """
  21. Creates a new instance of the SQLi Attack.
  22. """
  23. # Initialize attack
  24. super(SQLiAttack, self).__init__("SQLi Attack", "Injects a SQLi attack'",
  25. "Privilege elevation")
  26. # Define allowed parameters and their type
  27. self.supported_params.update({
  28. Param.MAC_SOURCE: ParameterTypes.TYPE_MAC_ADDRESS,
  29. Param.IP_SOURCE: ParameterTypes.TYPE_IP_ADDRESS,
  30. Param.MAC_DESTINATION: ParameterTypes.TYPE_MAC_ADDRESS,
  31. Param.IP_DESTINATION: ParameterTypes.TYPE_IP_ADDRESS,
  32. Param.PORT_DESTINATION: ParameterTypes.TYPE_PORT,
  33. Param.TARGET_HOST: ParameterTypes.TYPE_DOMAIN,
  34. #Param.TARGET_URI: ParameterTypes.TYPE_URI,
  35. Param.INJECT_AT_TIMESTAMP: ParameterTypes.TYPE_FLOAT,
  36. Param.INJECT_AFTER_PACKET: ParameterTypes.TYPE_PACKET_POSITION,
  37. Param.PACKETS_PER_SECOND: ParameterTypes.TYPE_FLOAT
  38. })
  39. def init_params(self):
  40. """
  41. Initialize the parameters of this attack using the user supplied command line parameters.
  42. Use the provided statistics to calculate default parameters and to process user
  43. supplied queries.
  44. """
  45. # PARAMETERS: initialize with default utilsvalues
  46. # (values are overwritten if user specifies them)
  47. # Attacker configuration
  48. most_used_ip_address = self.statistics.get_most_used_ip_address()
  49. self.add_param_value(Param.IP_SOURCE, most_used_ip_address)
  50. self.add_param_value(Param.MAC_SOURCE, self.statistics.get_mac_address(most_used_ip_address))
  51. # Victim configuration
  52. random_ip_address = self.statistics.get_random_ip_address()
  53. self.add_param_value(Param.IP_DESTINATION, random_ip_address)
  54. destination_mac = self.statistics.get_mac_address(random_ip_address)
  55. if isinstance(destination_mac, list) and len(destination_mac) == 0:
  56. destination_mac = self.generate_random_mac_address()
  57. self.add_param_value(Param.MAC_DESTINATION, destination_mac)
  58. self.add_param_value(Param.PORT_DESTINATION, self.http_port)
  59. # self.add_param_value(Param.TARGET_URI, "/")
  60. self.add_param_value(Param.TARGET_HOST, "www.hackme.com")
  61. # Attack configuration
  62. self.add_param_value(Param.INJECT_AFTER_PACKET, random.randint(0, self.statistics.get_packet_count()))
  63. self.add_param_value(Param.PACKETS_PER_SECOND,
  64. (self.statistics.get_pps_sent(most_used_ip_address) +
  65. self.statistics.get_pps_received(most_used_ip_address)) / 2)
  66. def generate_attack_pcap(self):
  67. # Timestamp
  68. timestamp_next_pkt = self.get_param_value(Param.INJECT_AT_TIMESTAMP)
  69. pps = self.get_param_value(Param.PACKETS_PER_SECOND)
  70. # Calculate complement packet rates of BG traffic per interval
  71. complement_interval_pps = self.statistics.calculate_complement_packet_rates(pps)
  72. # Initialize parameters
  73. packets = []
  74. mac_source = self.get_param_value(Param.MAC_SOURCE)
  75. ip_source = self.get_param_value(Param.IP_SOURCE)
  76. mac_destination = self.get_param_value(Param.MAC_DESTINATION)
  77. ip_destination = self.get_param_value(Param.IP_DESTINATION)
  78. port_destination = self.get_param_value(Param.PORT_DESTINATION)
  79. target_host = self.get_param_value(Param.TARGET_HOST)
  80. target_uri = "/" # self.get_param_value(Param.TARGET_URI)
  81. # Check ip.src == ip.dst
  82. self.ip_src_dst_equal_check(ip_source, ip_destination)
  83. path_attack_pcap = None
  84. # Set TTL based on TTL distribution of IP address
  85. source_ttl_dist = self.statistics.get_ttl_distribution(ip_source)
  86. if len(source_ttl_dist) > 0:
  87. source_ttl_prob_dict = Lea.fromValFreqsDict(source_ttl_dist)
  88. source_ttl_value = source_ttl_prob_dict.random()
  89. else:
  90. source_ttl_value = Util.handle_most_used_outputs(self.statistics.process_db_query("most_used(ttlValue)"))
  91. destination_ttl_dist = self.statistics.get_ttl_distribution(ip_destination)
  92. if len(destination_ttl_dist) > 0:
  93. destination_ttl_prob_dict = Lea.fromValFreqsDict(destination_ttl_dist)
  94. destination_ttl_value = destination_ttl_prob_dict.random()
  95. else:
  96. destination_ttl_value = Util.handle_most_used_outputs(self.statistics.process_db_query("most_used(ttlValue)"))
  97. # Inject SQLi Attack
  98. # Read SQLi Attack pcap file
  99. orig_ip_dst = None
  100. exploit_raw_packets = RawPcapReader(self.template_attack_pcap_path)
  101. inter_arrival_times, inter_arrival_time_dist = self.get_inter_arrival_time(exploit_raw_packets,True)
  102. timeSteps = Lea.fromValFreqsDict(inter_arrival_time_dist)
  103. exploit_raw_packets.close()
  104. exploit_raw_packets = RawPcapReader(self.template_attack_pcap_path)
  105. port_source = random.randint(self.minDefaultPort, self.maxDefaultPort) # experiments show this range of ports
  106. # Random TCP sequence numbers
  107. global attacker_seq
  108. attacker_seq = random.randint(1000, 50000)
  109. global victim_seq
  110. victim_seq = random.randint(1000, 50000)
  111. for pkt_num, pkt in enumerate(exploit_raw_packets):
  112. eth_frame = Ether(pkt[0])
  113. ip_pkt = eth_frame.payload
  114. tcp_pkt = ip_pkt.payload
  115. str_tcp_seg = str(tcp_pkt.payload)
  116. # Clean payloads
  117. eth_frame.payload = b''
  118. ip_pkt.payload = b''
  119. tcp_pkt.payload = b''
  120. if pkt_num == 0:
  121. prev_orig_port_source = tcp_pkt.getfieldval("sport")
  122. orig_ip_dst = ip_pkt.getfieldval("dst") # victim IP
  123. # Last connection
  124. if tcp_pkt.getfieldval("dport") != 80 and tcp_pkt.getfieldval("sport") != 80:
  125. # New connection, new random TCP sequence numbers
  126. attacker_seq = random.randint(1000, 50000)
  127. victim_seq = random.randint(1000, 50000)
  128. # First packet in a connection has ACK = 0
  129. tcp_pkt.setfieldval("ack", 0)
  130. # TODO: sometimes results in ERROR: Invalid IP addresses; source IP is the same as destination IP
  131. # TODO: so far only for the joomla pcap, fixed by specifying inject_after-pkt parameter
  132. # Attacker --> vicitm
  133. if ip_pkt.getfieldval("dst") == orig_ip_dst: # victim IP
  134. # There are 363 TCP connections with different source ports, for each of them we generate random port
  135. if tcp_pkt.getfieldval("sport") != prev_orig_port_source and tcp_pkt.getfieldval("dport") != 4444\
  136. and (tcp_pkt.getfieldval("dport") == 80 or tcp_pkt.getfieldval("sport") == 80):
  137. port_source = random.randint(self.minDefaultPort, self.maxDefaultPort)
  138. prev_orig_port_source = tcp_pkt.getfieldval("sport")
  139. # New connection, new random TCP sequence numbers
  140. attacker_seq = random.randint(1000, 50000)
  141. victim_seq = random.randint(1000, 50000)
  142. # First packet in a connection has ACK = 0
  143. tcp_pkt.setfieldval("ack", 0)
  144. # Last connection
  145. elif tcp_pkt.getfieldval("dport") != 80 and tcp_pkt.getfieldval("sport") != 80:
  146. # New connection, new random TCP sequence numbers
  147. attacker_seq = random.randint(1000, 50000)
  148. victim_seq = random.randint(1000, 50000)
  149. # First packet in a connection has ACK = 0
  150. tcp_pkt.setfieldval("ack", 0)
  151. # Ether
  152. eth_frame.setfieldval("src", mac_source)
  153. eth_frame.setfieldval("dst", mac_destination)
  154. # IP
  155. ip_pkt.setfieldval("src", ip_source)
  156. ip_pkt.setfieldval("dst", ip_destination)
  157. ip_pkt.setfieldval("ttl", source_ttl_value)
  158. # TCP
  159. # Regular connection
  160. if tcp_pkt.getfieldval("dport") == 80 or tcp_pkt.getfieldval("sport") == 80:
  161. tcp_pkt.setfieldval("sport",port_source)
  162. tcp_pkt.setfieldval("dport", port_destination)
  163. str_tcp_seg = self.modify_http_header(str_tcp_seg, '/ATutor', target_uri, orig_ip_dst, target_host)
  164. # TCP Seq, Ack
  165. if tcp_pkt.getfieldval("ack") != 0:
  166. tcp_pkt.setfieldval("ack", victim_seq)
  167. tcp_pkt.setfieldval("seq", attacker_seq)
  168. if not (tcp_pkt.getfieldval("flags") == 16 and len(str_tcp_seg) == 0): # flags=A:
  169. attacker_seq += max(len(str_tcp_seg), 1)
  170. new_pkt = (eth_frame / ip_pkt/ tcp_pkt / str_tcp_seg)
  171. new_pkt.time = timestamp_next_pkt
  172. pps = max(Util.get_interval_pps(complement_interval_pps, timestamp_next_pkt), 10)
  173. timestamp_next_pkt = Util.update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  174. # Victim --> attacker
  175. else:
  176. # Ether
  177. eth_frame.setfieldval("src", mac_destination)
  178. eth_frame.setfieldval("dst", mac_source)
  179. # IP
  180. ip_pkt.setfieldval("src", ip_destination)
  181. ip_pkt.setfieldval("dst", ip_source)
  182. ip_pkt.setfieldval("ttl", destination_ttl_value)
  183. # TCP
  184. # Regular connection
  185. if tcp_pkt.getfieldval("dport") == 80 or tcp_pkt.getfieldval("sport") == 80:
  186. tcp_pkt.setfieldval("dport", port_source)
  187. tcp_pkt.setfieldval("sport", port_destination)
  188. str_tcp_seg = self.modify_http_header(str_tcp_seg, '/ATutor', target_uri, orig_ip_dst, target_host)
  189. # TCP Seq, ACK
  190. tcp_pkt.setfieldval("ack", attacker_seq)
  191. tcp_pkt.setfieldval("seq", victim_seq)
  192. strLen = len(str_tcp_seg)
  193. if not (tcp_pkt.getfieldval("flags") == 16 and strLen == 0): # flags=A:
  194. victim_seq += max(strLen, 1)
  195. new_pkt = (eth_frame / ip_pkt / tcp_pkt / str_tcp_seg)
  196. timestamp_next_pkt = Util.update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  197. new_pkt.time = timestamp_next_pkt
  198. packets.append(new_pkt)
  199. exploit_raw_packets.close()
  200. # Store timestamp of first packet (for attack label)
  201. self.attack_start_utime = packets[0].time
  202. self.attack_end_utime = packets[-1].time
  203. if len(packets) > 0:
  204. packets = sorted(packets, key=lambda pkt: pkt.time)
  205. path_attack_pcap = self.write_attack_pcap(packets, True, path_attack_pcap)
  206. # return packets sorted by packet time_sec_start
  207. # pkt_num+1: because pkt_num starts at 0
  208. return pkt_num + 1, path_attack_pcap