SQLiAttack.py 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293
  1. import logging
  2. import random
  3. from lea import Lea
  4. from scapy.utils import RawPcapReader
  5. from scapy.layers.inet import Ether
  6. from ID2TLib.Utility import update_timestamp, get_interval_pps, handle_most_used_outputs
  7. from definitions import ROOT_DIR
  8. from Attack import BaseAttack
  9. from Attack.AttackParameters import Parameter as Param
  10. from Attack.AttackParameters import ParameterTypes
  11. logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
  12. # noinspection PyPep8
  13. class SQLiAttack(BaseAttack.BaseAttack):
  14. template_attack_pcap_path = ROOT_DIR + "/../resources/ATutorSQLi.pcap"
  15. # HTTP port
  16. http_port = 80
  17. # Metasploit experiments show this range of ports
  18. minDefaultPort = 30000
  19. maxDefaultPort = 50000
  20. def __init__(self):
  21. """
  22. Creates a new instance of the SQLi Attack.
  23. """
  24. # Initialize attack
  25. super(SQLiAttack, self).__init__("SQLi Attack", "Injects a SQLi attack'",
  26. "Privilege elevation")
  27. # Define allowed parameters and their type
  28. self.supported_params.update({
  29. Param.MAC_SOURCE: ParameterTypes.TYPE_MAC_ADDRESS,
  30. Param.IP_SOURCE: ParameterTypes.TYPE_IP_ADDRESS,
  31. Param.MAC_DESTINATION: ParameterTypes.TYPE_MAC_ADDRESS,
  32. Param.IP_DESTINATION: ParameterTypes.TYPE_IP_ADDRESS,
  33. Param.PORT_DESTINATION: ParameterTypes.TYPE_PORT,
  34. Param.TARGET_HOST: ParameterTypes.TYPE_DOMAIN,
  35. #Param.TARGET_URI: ParameterTypes.TYPE_URI,
  36. Param.INJECT_AT_TIMESTAMP: ParameterTypes.TYPE_FLOAT,
  37. Param.INJECT_AFTER_PACKET: ParameterTypes.TYPE_PACKET_POSITION,
  38. Param.PACKETS_PER_SECOND: ParameterTypes.TYPE_FLOAT
  39. })
  40. def init_params(self):
  41. """
  42. Initialize the parameters of this attack using the user supplied command line parameters.
  43. Use the provided statistics to calculate default parameters and to process user
  44. supplied queries.
  45. """
  46. # PARAMETERS: initialize with default utilsvalues
  47. # (values are overwritten if user specifies them)
  48. # Attacker configuration
  49. most_used_ip_address = self.statistics.get_most_used_ip_address()
  50. self.add_param_value(Param.IP_SOURCE, most_used_ip_address)
  51. self.add_param_value(Param.MAC_SOURCE, self.statistics.get_mac_address(most_used_ip_address))
  52. # Victim configuration
  53. random_ip_address = self.statistics.get_random_ip_address()
  54. self.add_param_value(Param.IP_DESTINATION, random_ip_address)
  55. destination_mac = self.statistics.get_mac_address(random_ip_address)
  56. if isinstance(destination_mac, list) and len(destination_mac) == 0:
  57. destination_mac = self.generate_random_mac_address()
  58. self.add_param_value(Param.MAC_DESTINATION, destination_mac)
  59. self.add_param_value(Param.PORT_DESTINATION, self.http_port)
  60. # self.add_param_value(Param.TARGET_URI, "/")
  61. self.add_param_value(Param.TARGET_HOST, "www.hackme.com")
  62. # Attack configuration
  63. self.add_param_value(Param.INJECT_AFTER_PACKET, random.randint(0, self.statistics.get_packet_count()))
  64. self.add_param_value(Param.PACKETS_PER_SECOND,
  65. (self.statistics.get_pps_sent(most_used_ip_address) +
  66. self.statistics.get_pps_received(most_used_ip_address)) / 2)
  67. def generate_attack_pcap(self):
  68. # Timestamp
  69. timestamp_next_pkt = self.get_param_value(Param.INJECT_AT_TIMESTAMP)
  70. pps = self.get_param_value(Param.PACKETS_PER_SECOND)
  71. # Calculate complement packet rates of BG traffic per interval
  72. complement_interval_pps = self.statistics.calculate_complement_packet_rates(pps)
  73. # Initialize parameters
  74. packets = []
  75. mac_source = self.get_param_value(Param.MAC_SOURCE)
  76. ip_source = self.get_param_value(Param.IP_SOURCE)
  77. mac_destination = self.get_param_value(Param.MAC_DESTINATION)
  78. ip_destination = self.get_param_value(Param.IP_DESTINATION)
  79. port_destination = self.get_param_value(Param.PORT_DESTINATION)
  80. target_host = self.get_param_value(Param.TARGET_HOST)
  81. target_uri = "/" # self.get_param_value(Param.TARGET_URI)
  82. # Check ip.src == ip.dst
  83. self.ip_src_dst_equal_check(ip_source, ip_destination)
  84. path_attack_pcap = None
  85. # Set TTL based on TTL distribution of IP address
  86. source_ttl_dist = self.statistics.get_ttl_distribution(ip_source)
  87. if len(source_ttl_dist) > 0:
  88. source_ttl_prob_dict = Lea.fromValFreqsDict(source_ttl_dist)
  89. source_ttl_value = source_ttl_prob_dict.random()
  90. else:
  91. source_ttl_value = handle_most_used_outputs(self.statistics.process_db_query("most_used(ttlValue)"))
  92. destination_ttl_dist = self.statistics.get_ttl_distribution(ip_destination)
  93. if len(destination_ttl_dist) > 0:
  94. destination_ttl_prob_dict = Lea.fromValFreqsDict(destination_ttl_dist)
  95. destination_ttl_value = destination_ttl_prob_dict.random()
  96. else:
  97. destination_ttl_value = handle_most_used_outputs(self.statistics.process_db_query("most_used(ttlValue)"))
  98. # Inject SQLi Attack
  99. # Read SQLi Attack pcap file
  100. orig_ip_dst = None
  101. exploit_raw_packets = RawPcapReader(self.template_attack_pcap_path)
  102. inter_arrival_times, inter_arrival_time_dist = self.get_inter_arrival_time(exploit_raw_packets,True)
  103. timeSteps = Lea.fromValFreqsDict(inter_arrival_time_dist)
  104. exploit_raw_packets.close()
  105. exploit_raw_packets = RawPcapReader(self.template_attack_pcap_path)
  106. port_source = random.randint(self.minDefaultPort,self.maxDefaultPort) # experiments show this range of ports
  107. # Random TCP sequence numbers
  108. global attacker_seq
  109. attacker_seq = random.randint(1000, 50000)
  110. global victim_seq
  111. victim_seq = random.randint(1000, 50000)
  112. for pkt_num, pkt in enumerate(exploit_raw_packets):
  113. eth_frame = Ether(pkt[0])
  114. ip_pkt = eth_frame.payload
  115. tcp_pkt = ip_pkt.payload
  116. str_tcp_seg = str(tcp_pkt.payload)
  117. # Clean payloads
  118. eth_frame.payload = b''
  119. ip_pkt.payload = b''
  120. tcp_pkt.payload = b''
  121. if pkt_num == 0:
  122. prev_orig_port_source = tcp_pkt.getfieldval("sport")
  123. orig_ip_dst = ip_pkt.getfieldval("dst") # victim IP
  124. if tcp_pkt.getfieldval("dport") == 80 or tcp_pkt.getfieldval("sport") == 80:
  125. # Attacker --> vicitm
  126. if ip_pkt.getfieldval("dst") == orig_ip_dst: # victim IP
  127. # There are 363 TCP connections with different source ports, for each of them we generate random port
  128. if tcp_pkt.getfieldval("sport") != prev_orig_port_source and tcp_pkt.getfieldval("dport") != 4444:
  129. port_source = random.randint(self.minDefaultPort, self.maxDefaultPort)
  130. prev_orig_port_source = tcp_pkt.getfieldval("sport")
  131. # New connection, new random TCP sequence numbers
  132. attacker_seq = random.randint(1000, 50000)
  133. victim_seq = random.randint(1000, 50000)
  134. # First packet in a connection has ACK = 0
  135. tcp_pkt.setfieldval("ack", 0)
  136. # Ether
  137. eth_frame.setfieldval("src", mac_source)
  138. eth_frame.setfieldval("dst", mac_destination)
  139. # IP
  140. ip_pkt.setfieldval("src", ip_source)
  141. ip_pkt.setfieldval("dst", ip_destination)
  142. ip_pkt.setfieldval("ttl", source_ttl_value)
  143. # TCP
  144. tcp_pkt.setfieldval("sport",port_source)
  145. tcp_pkt.setfieldval("dport", port_destination)
  146. str_tcp_seg = self.modify_http_header(str_tcp_seg, '/ATutor', target_uri, orig_ip_dst, target_host)
  147. # TCP Seq, Ack
  148. if tcp_pkt.getfieldval("ack") != 0:
  149. tcp_pkt.setfieldval("ack", victim_seq)
  150. tcp_pkt.setfieldval("seq", attacker_seq)
  151. if not (tcp_pkt.getfieldval("flags") == 16 and len(str_tcp_seg) == 0): # flags=A:
  152. attacker_seq += max(len(str_tcp_seg), 1)
  153. new_pkt = (eth_frame / ip_pkt/ tcp_pkt / str_tcp_seg)
  154. new_pkt.time = timestamp_next_pkt
  155. pps = max(get_interval_pps(complement_interval_pps, timestamp_next_pkt), 10)
  156. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  157. # Victim --> attacker
  158. else:
  159. # Ether
  160. eth_frame.setfieldval("src", mac_destination)
  161. eth_frame.setfieldval("dst", mac_source)
  162. # IP
  163. ip_pkt.setfieldval("src", ip_destination)
  164. ip_pkt.setfieldval("dst", ip_source)
  165. ip_pkt.setfieldval("ttl", destination_ttl_value)
  166. # TCP
  167. tcp_pkt.setfieldval("dport", port_source)
  168. tcp_pkt.setfieldval("sport", port_destination)
  169. str_tcp_seg = self.modify_http_header(str_tcp_seg, '/ATutor', target_uri, orig_ip_dst, target_host)
  170. # TCP Seq, ACK
  171. tcp_pkt.setfieldval("ack", attacker_seq)
  172. tcp_pkt.setfieldval("seq", victim_seq)
  173. strLen = len(str_tcp_seg)
  174. if not (tcp_pkt.getfieldval("flags") == 16 and strLen == 0): # flags=A:
  175. victim_seq += max(strLen, 1)
  176. new_pkt = (eth_frame / ip_pkt / tcp_pkt / str_tcp_seg)
  177. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  178. new_pkt.time = timestamp_next_pkt
  179. # The last connection
  180. else:
  181. # New connection, new random TCP sequence numbers
  182. attacker_seq = random.randint(1000, 50000)
  183. victim_seq = random.randint(1000, 50000)
  184. # First packet in a connection has ACK = 0
  185. tcp_pkt.setfieldval("ack", 0)
  186. #port_source = random.randint(self.minDefaultPort, self.maxDefaultPort)
  187. # Attacker --> vicitm
  188. if ip_pkt.getfieldval("dst") == orig_ip_dst: # victim IP
  189. # Ether
  190. eth_frame.setfieldval("src", mac_source)
  191. eth_frame.setfieldval("dst", mac_destination)
  192. # IP
  193. ip_pkt.setfieldval("src", ip_source)
  194. ip_pkt.setfieldval("dst", ip_destination)
  195. ip_pkt.setfieldval("ttl", source_ttl_value)
  196. # TCP
  197. #tcp_pkt.setfieldval("sport", port_source)
  198. str_tcp_seg = self.modify_http_header(str_tcp_seg, '/ATutor', target_uri, orig_ip_dst, target_host)
  199. # TCP Seq, Ack
  200. if tcp_pkt.getfieldval("ack") != 0:
  201. tcp_pkt.setfieldval("ack", victim_seq)
  202. tcp_pkt.setfieldval("seq", attacker_seq)
  203. if not (tcp_pkt.getfieldval("flags") == 16 and len(str_tcp_seg) == 0): # flags=A:
  204. attacker_seq += max(len(str_tcp_seg), 1)
  205. new_pkt = (eth_frame / ip_pkt / tcp_pkt / str_tcp_seg)
  206. new_pkt.time = timestamp_next_pkt
  207. pps = max(get_interval_pps(complement_interval_pps, timestamp_next_pkt), 10)
  208. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  209. # Victim --> attacker
  210. else:
  211. # Ether
  212. eth_frame.setfieldval("src", mac_destination)
  213. eth_frame.setfieldval("dst", mac_source)
  214. # IP
  215. ip_pkt.setfieldval("src", ip_destination)
  216. ip_pkt.setfieldval("dst", ip_source)
  217. ip_pkt.setfieldval("ttl", destination_ttl_value)
  218. # TCP
  219. #tcp_pkt.setfieldval("dport", port_source)
  220. str_tcp_seg = self.modify_http_header(str_tcp_seg, '/ATutor', target_uri, orig_ip_dst, target_host)
  221. # TCP Seq, ACK
  222. tcp_pkt.setfieldval("ack", attacker_seq)
  223. tcp_pkt.setfieldval("seq", victim_seq)
  224. strLen = len(str_tcp_seg)
  225. if not (tcp_pkt.getfieldval("flags") == 16 and strLen == 0): # flags=A:
  226. victim_seq += max(strLen, 1)
  227. new_pkt = (eth_frame / ip_pkt / tcp_pkt / str_tcp_seg)
  228. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  229. new_pkt.time = timestamp_next_pkt
  230. packets.append(new_pkt)
  231. exploit_raw_packets.close()
  232. # Store timestamp of first packet (for attack label)
  233. self.attack_start_utime = packets[0].time
  234. self.attack_end_utime = packets[-1].time
  235. if len(packets) > 0:
  236. packets = sorted(packets, key=lambda pkt: pkt.time)
  237. path_attack_pcap = self.write_attack_pcap(packets, True, path_attack_pcap)
  238. # return packets sorted by packet time_sec_start
  239. # pkt_num+1: because pkt_num starts at 0
  240. return pkt_num + 1, path_attack_pcap