|
@@ -125,7 +125,7 @@ class SQLiAttack(BaseAttack.BaseAttack):
|
|
exploit_raw_packets.close()
|
|
exploit_raw_packets.close()
|
|
exploit_raw_packets = RawPcapReader(self.template_attack_pcap_path)
|
|
exploit_raw_packets = RawPcapReader(self.template_attack_pcap_path)
|
|
|
|
|
|
- port_source = random.randint(self.minDefaultPort,self.maxDefaultPort)
|
|
+ port_source = random.randint(self.minDefaultPort, self.maxDefaultPort)
|
|
|
|
|
|
|
|
|
|
global attacker_seq
|
|
global attacker_seq
|
|
@@ -148,13 +148,22 @@ class SQLiAttack(BaseAttack.BaseAttack):
|
|
prev_orig_port_source = tcp_pkt.getfieldval("sport")
|
|
prev_orig_port_source = tcp_pkt.getfieldval("sport")
|
|
orig_ip_dst = ip_pkt.getfieldval("dst")
|
|
orig_ip_dst = ip_pkt.getfieldval("dst")
|
|
|
|
|
|
|
|
+
|
|
|
|
+ if tcp_pkt.getfieldval("dport") != 80 and tcp_pkt.getfieldval("sport") != 80:
|
|
|
|
+
|
|
|
|
+ attacker_seq = random.randint(1000, 50000)
|
|
|
|
+ victim_seq = random.randint(1000, 50000)
|
|
|
|
+
|
|
|
|
+ tcp_pkt.setfieldval("ack", 0)
|
|
|
|
+
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if ip_pkt.getfieldval("dst") == orig_ip_dst:
|
|
if ip_pkt.getfieldval("dst") == orig_ip_dst:
|
|
|
|
|
|
|
|
|
|
- if tcp_pkt.getfieldval("sport") != prev_orig_port_source and tcp_pkt.getfieldval("dport") != 4444:
|
|
+ if tcp_pkt.getfieldval("sport") != prev_orig_port_source and tcp_pkt.getfieldval("dport") != 4444\
|
|
|
|
+ and (tcp_pkt.getfieldval("dport") == 80 or tcp_pkt.getfieldval("sport") == 80):
|
|
port_source = random.randint(self.minDefaultPort, self.maxDefaultPort)
|
|
port_source = random.randint(self.minDefaultPort, self.maxDefaultPort)
|
|
prev_orig_port_source = tcp_pkt.getfieldval("sport")
|
|
prev_orig_port_source = tcp_pkt.getfieldval("sport")
|
|
|
|
|