PortscanAttack.py 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263
  1. import logging
  2. import csv
  3. from random import shuffle, randint, choice
  4. from lea import Lea
  5. from scapy.layers.inet import IP, Ether, TCP
  6. from definitions import ROOT_DIR
  7. from Attack import BaseAttack
  8. from Attack.AttackParameters import Parameter as Param
  9. from Attack.AttackParameters import ParameterTypes
  10. from ID2TLib.Utility import update_timestamp, get_interval_pps, handle_most_used_outputs
  11. logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
  12. # noinspection PyPep8
  13. class PortscanAttack(BaseAttack.BaseAttack):
  14. def __init__(self):
  15. """
  16. Creates a new instance of the PortscanAttack.
  17. """
  18. # Initialize attack
  19. super(PortscanAttack, self).__init__("Portscan Attack", "Injects a nmap 'regular scan'",
  20. "Scanning/Probing")
  21. # Define allowed parameters and their type
  22. self.supported_params.update({
  23. Param.IP_SOURCE: ParameterTypes.TYPE_IP_ADDRESS,
  24. Param.IP_DESTINATION: ParameterTypes.TYPE_IP_ADDRESS,
  25. Param.PORT_SOURCE: ParameterTypes.TYPE_PORT,
  26. Param.PORT_DESTINATION: ParameterTypes.TYPE_PORT,
  27. Param.PORT_OPEN: ParameterTypes.TYPE_PORT,
  28. Param.MAC_SOURCE: ParameterTypes.TYPE_MAC_ADDRESS,
  29. Param.MAC_DESTINATION: ParameterTypes.TYPE_MAC_ADDRESS,
  30. Param.INJECT_AT_TIMESTAMP: ParameterTypes.TYPE_FLOAT,
  31. Param.INJECT_AFTER_PACKET: ParameterTypes.TYPE_PACKET_POSITION,
  32. Param.PORT_DEST_SHUFFLE: ParameterTypes.TYPE_BOOLEAN,
  33. Param.PORT_DEST_ORDER_DESC: ParameterTypes.TYPE_BOOLEAN,
  34. Param.IP_SOURCE_RANDOMIZE: ParameterTypes.TYPE_BOOLEAN,
  35. Param.PACKETS_PER_SECOND: ParameterTypes.TYPE_FLOAT,
  36. Param.PORT_SOURCE_RANDOMIZE: ParameterTypes.TYPE_BOOLEAN
  37. })
  38. def init_params(self):
  39. """
  40. Initialize the parameters of this attack using the user supplied command line parameters.
  41. Use the provided statistics to calculate default parameters and to process user
  42. supplied queries.
  43. :param statistics: Reference to a statistics object.
  44. """
  45. # PARAMETERS: initialize with default values
  46. # (values are overwritten if user specifies them)
  47. most_used_ip_address = self.statistics.get_most_used_ip_address()
  48. self.add_param_value(Param.IP_SOURCE, most_used_ip_address)
  49. self.add_param_value(Param.IP_SOURCE_RANDOMIZE, 'False')
  50. self.add_param_value(Param.MAC_SOURCE, self.statistics.get_mac_address(most_used_ip_address))
  51. random_ip_address = self.statistics.get_random_ip_address()
  52. # ip-dst should be valid and not equal to ip.src
  53. while not self.is_valid_ip_address(random_ip_address) or random_ip_address==most_used_ip_address:
  54. random_ip_address = self.statistics.get_random_ip_address()
  55. self.add_param_value(Param.IP_DESTINATION, random_ip_address)
  56. destination_mac = self.statistics.get_mac_address(random_ip_address)
  57. if isinstance(destination_mac, list) and len(destination_mac) == 0:
  58. destination_mac = self.generate_random_mac_address()
  59. self.add_param_value(Param.MAC_DESTINATION, destination_mac)
  60. self.add_param_value(Param.PORT_DESTINATION, self.get_ports_from_nmap_service_dst(1000))
  61. self.add_param_value(Param.PORT_OPEN, '1')
  62. self.add_param_value(Param.PORT_DEST_SHUFFLE, 'False')
  63. self.add_param_value(Param.PORT_DEST_ORDER_DESC, 'False')
  64. self.add_param_value(Param.PORT_SOURCE, randint(1024, 65535))
  65. self.add_param_value(Param.PORT_SOURCE_RANDOMIZE, 'False')
  66. self.add_param_value(Param.PACKETS_PER_SECOND,
  67. (self.statistics.get_pps_sent(most_used_ip_address) +
  68. self.statistics.get_pps_received(most_used_ip_address)) / 2)
  69. self.add_param_value(Param.INJECT_AFTER_PACKET, randint(0, self.statistics.get_packet_count()))
  70. def get_ports_from_nmap_service_dst(self, ports_num):
  71. """
  72. Read the most ports_num frequently open ports from nmap-service-tcp file to be used in the port scan.
  73. :return: Ports numbers to be used as default destination ports or default open ports in the port scan.
  74. """
  75. ports_dst = []
  76. spamreader = csv.reader(open(ROOT_DIR + '/../resources/nmap-services-tcp.csv', 'rt'), delimiter=',')
  77. for count in range(ports_num):
  78. # escape first row (header)
  79. next(spamreader)
  80. # save ports numbers
  81. ports_dst.append(next(spamreader)[0])
  82. # shuffle ports numbers partially
  83. if (ports_num == 1000): # used for port.dst
  84. temp_array = [[0 for i in range(10)] for i in range(100)]
  85. port_dst_shuffled = []
  86. for count in range(0, 10):
  87. temp_array[count] = ports_dst[count * 100:(count + 1) * 100]
  88. shuffle(temp_array[count])
  89. port_dst_shuffled += temp_array[count]
  90. else: # used for port.open
  91. shuffle(ports_dst)
  92. port_dst_shuffled = ports_dst
  93. return port_dst_shuffled
  94. def generate_attack_pcap(self):
  95. mac_source = self.get_param_value(Param.MAC_SOURCE)
  96. mac_destination = self.get_param_value(Param.MAC_DESTINATION)
  97. pps = self.get_param_value(Param.PACKETS_PER_SECOND)
  98. # Calculate complement packet rates of the background traffic for each interval
  99. complement_interval_pps = self.statistics.calculate_complement_packet_rates(pps)
  100. # Determine ports
  101. dest_ports = self.get_param_value(Param.PORT_DESTINATION)
  102. if self.get_param_value(Param.PORT_DEST_ORDER_DESC):
  103. dest_ports.reverse()
  104. elif self.get_param_value(Param.PORT_DEST_SHUFFLE):
  105. shuffle(dest_ports)
  106. if self.get_param_value(Param.PORT_SOURCE_RANDOMIZE):
  107. sport = randint(1, 65535)
  108. else:
  109. sport = self.get_param_value(Param.PORT_SOURCE)
  110. # Timestamp
  111. timestamp_next_pkt = self.get_param_value(Param.INJECT_AT_TIMESTAMP)
  112. # store start time of attack
  113. self.attack_start_utime = timestamp_next_pkt
  114. timestamp_prv_reply, timestamp_confirm = 0,0
  115. # Initialize parameters
  116. packets = []
  117. ip_source = self.get_param_value(Param.IP_SOURCE)
  118. ip_destination = self.get_param_value(Param.IP_DESTINATION)
  119. # Check ip.src == ip.dst
  120. self.ip_src_dst_equal_check(ip_source, ip_destination)
  121. # Select open ports
  122. ports_open = self.get_param_value(Param.PORT_OPEN)
  123. if ports_open == 1: # user did not specify open ports
  124. # the ports that were already used by ip.dst (direction in) in the background traffic are open ports
  125. ports_used_by_ip_dst = self.statistics.process_db_query(
  126. "SELECT portNumber FROM ip_ports WHERE portDirection='in' AND ipAddress='" + ip_destination + "'")
  127. if ports_used_by_ip_dst:
  128. ports_open = ports_used_by_ip_dst
  129. else: # if no ports were retrieved from database
  130. # Take open ports from nmap-service file
  131. #ports_temp = self.get_ports_from_nmap_service_dst(100)
  132. #ports_open = ports_temp[0:randint(1,10)]
  133. # OR take open ports from the most used ports in traffic statistics
  134. ports_open = self.statistics.process_db_query(
  135. "SELECT portNumber FROM ip_ports GROUP BY portNumber ORDER BY SUM(portCount) DESC LIMIT "+str(randint(1,10)))
  136. # in case of one open port, convert ports_open to array
  137. if not isinstance(ports_open, list):
  138. ports_open = [ports_open]
  139. # Set MSS (Maximum Segment Size) based on MSS distribution of IP address
  140. source_mss_dist = self.statistics.get_mss_distribution(ip_source)
  141. if len(source_mss_dist) > 0:
  142. source_mss_prob_dict = Lea.fromValFreqsDict(source_mss_dist)
  143. source_mss_value = source_mss_prob_dict.random()
  144. else:
  145. source_mss_value = handle_most_used_outputs(self.statistics.process_db_query("most_used(mssValue)"))
  146. destination_mss_dist = self.statistics.get_mss_distribution(ip_destination)
  147. if len(destination_mss_dist) > 0:
  148. destination_mss_prob_dict = Lea.fromValFreqsDict(destination_mss_dist)
  149. destination_mss_value = destination_mss_prob_dict.random()
  150. else:
  151. destination_mss_value = handle_most_used_outputs(self.statistics.process_db_query("most_used(mssValue)"))
  152. # Set TTL based on TTL distribution of IP address
  153. source_ttl_dist = self.statistics.get_ttl_distribution(ip_source)
  154. if len(source_ttl_dist) > 0:
  155. source_ttl_prob_dict = Lea.fromValFreqsDict(source_ttl_dist)
  156. source_ttl_value = source_ttl_prob_dict.random()
  157. else:
  158. source_ttl_value = handle_most_used_outputs(self.statistics.process_db_query("most_used(ttlValue)"))
  159. destination_ttl_dist = self.statistics.get_ttl_distribution(ip_destination)
  160. if len(destination_ttl_dist) > 0:
  161. destination_ttl_prob_dict = Lea.fromValFreqsDict(destination_ttl_dist)
  162. destination_ttl_value = destination_ttl_prob_dict.random()
  163. else:
  164. destination_ttl_value = handle_most_used_outputs(self.statistics.process_db_query("most_used(ttlValue)"))
  165. # Set Window Size based on Window Size distribution of IP address
  166. source_win_dist = self.statistics.get_win_distribution(ip_source)
  167. if len(source_win_dist) > 0:
  168. source_win_prob_dict = Lea.fromValFreqsDict(source_win_dist)
  169. source_win_value = source_win_prob_dict.random()
  170. else:
  171. source_win_value = handle_most_used_outputs(self.statistics.process_db_query("most_used(winSize)"))
  172. destination_win_dist = self.statistics.get_win_distribution(ip_destination)
  173. if len(destination_win_dist) > 0:
  174. destination_win_prob_dict = Lea.fromValFreqsDict(destination_win_dist)
  175. destination_win_value = destination_win_prob_dict.random()
  176. else:
  177. destination_win_value = handle_most_used_outputs(self.statistics.process_db_query("most_used(winSize)"))
  178. minDelay,maxDelay = self.get_reply_delay(ip_destination)
  179. for dport in dest_ports:
  180. # Parameters changing each iteration
  181. if self.get_param_value(Param.IP_SOURCE_RANDOMIZE) and isinstance(ip_source, list):
  182. ip_source = choice(ip_source)
  183. # 1) Build request package
  184. request_ether = Ether(src=mac_source, dst=mac_destination)
  185. request_ip = IP(src=ip_source, dst=ip_destination, ttl=source_ttl_value)
  186. # Random src port for each packet
  187. sport = randint(1, 65535)
  188. request_tcp = TCP(sport=sport, dport=dport, window= source_win_value, flags='S', options=[('MSS', source_mss_value)])
  189. request = (request_ether / request_ip / request_tcp)
  190. request.time = timestamp_next_pkt
  191. # Append request
  192. packets.append(request)
  193. # 2) Build reply (for open ports) package
  194. if dport in ports_open: # destination port is OPEN
  195. reply_ether = Ether(src=mac_destination, dst=mac_source)
  196. reply_ip = IP(src=ip_destination, dst=ip_source, ttl=destination_ttl_value, flags='DF')
  197. reply_tcp = TCP(sport=dport, dport=sport, seq=0, ack=1, flags='SA', window=destination_win_value,
  198. options=[('MSS', destination_mss_value)])
  199. reply = (reply_ether / reply_ip / reply_tcp)
  200. timestamp_reply = update_timestamp(timestamp_next_pkt,pps,minDelay)
  201. while (timestamp_reply <= timestamp_prv_reply):
  202. timestamp_reply = update_timestamp(timestamp_prv_reply,pps,minDelay)
  203. timestamp_prv_reply = timestamp_reply
  204. reply.time = timestamp_reply
  205. packets.append(reply)
  206. # requester confirms
  207. confirm_ether = request_ether
  208. confirm_ip = request_ip
  209. confirm_tcp = TCP(sport=sport, dport=dport, seq=1, window=0, flags='R')
  210. confirm = (confirm_ether / confirm_ip / confirm_tcp)
  211. timestamp_confirm = update_timestamp(timestamp_reply,pps,minDelay)
  212. confirm.time = timestamp_confirm
  213. packets.append(confirm)
  214. # else: destination port is NOT OPEN -> no reply is sent by target
  215. pps = max(get_interval_pps(complement_interval_pps, timestamp_next_pkt), 10)
  216. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps)
  217. # store end time of attack
  218. self.attack_end_utime = packets[-1].time
  219. # write attack packets to pcap
  220. pcap_path = self.write_attack_pcap(sorted(packets, key=lambda pkt: pkt.time))
  221. # return packets sorted by packet time_sec_start
  222. return len(packets), pcap_path