Created
April 6, 2013 06:30
-
-
Save securitytube/5325126 to your computer and use it in GitHub Desktop.
TCP Packet Injection: Original Source: http://code.securitytube.net/TCP-Packet-Injection.c
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include<stdio.h> | |
#include<stdlib.h> | |
#include<sys/socket.h> | |
#include<features.h> | |
#include<linux/if_packet.h> | |
#include<linux/if_ether.h> | |
#include<errno.h> | |
#include<sys/ioctl.h> | |
#include<net/if.h> | |
#include<net/ethernet.h> | |
#include<linux/ip.h> | |
#include<linux/tcp.h> | |
#include<arpa/inet.h> | |
#include<string.h> | |
#include<sys/time.h> | |
#define DATA_SIZE 100 | |
#define SRC_ETHER_ADDR "aa:aa:aa:aa:aa:aa" | |
#define DST_ETHER_ADDR "bb:bb:bb:bb:bb:bb" | |
#define SRC_IP "192.168.0.10" | |
#define DST_IP "192.168.0.11" | |
#define SRC_PORT 80 | |
#define DST_PORT 100 | |
typedef struct PseudoHeader{ | |
unsigned long int source_ip; | |
unsigned long int dest_ip; | |
unsigned char reserved; | |
unsigned char protocol; | |
unsigned short int tcp_length; | |
}PseudoHeader; | |
int CreateRawSocket(int protocol_to_sniff) | |
{ | |
int rawsock; | |
if((rawsock = socket(PF_PACKET, SOCK_RAW, htons(protocol_to_sniff)))== -1) | |
{ | |
perror("Error creating raw socket: "); | |
exit(-1); | |
} | |
return rawsock; | |
} | |
int BindRawSocketToInterface(char *device, int rawsock, int protocol) | |
{ | |
struct sockaddr_ll sll; | |
struct ifreq ifr; | |
bzero(&sll, sizeof(sll)); | |
bzero(&ifr, sizeof(ifr)); | |
/* First Get the Interface Index */ | |
strncpy((char *)ifr.ifr_name, device, IFNAMSIZ); | |
if((ioctl(rawsock, SIOCGIFINDEX, &ifr)) == -1) | |
{ | |
printf("Error getting Interface index !\n"); | |
exit(-1); | |
} | |
/* Bind our raw socket to this interface */ | |
sll.sll_family = AF_PACKET; | |
sll.sll_ifindex = ifr.ifr_ifindex; | |
sll.sll_protocol = htons(protocol); | |
if((bind(rawsock, (struct sockaddr *)&sll, sizeof(sll)))== -1) | |
{ | |
perror("Error binding raw socket to interface\n"); | |
exit(-1); | |
} | |
return 1; | |
} | |
int SendRawPacket(int rawsock, unsigned char *pkt, int pkt_len) | |
{ | |
int sent= 0; | |
/* A simple write on the socket ..thats all it takes ! */ | |
if((sent = write(rawsock, pkt, pkt_len)) != pkt_len) | |
{ | |
/* Error */ | |
printf("Could only send %d bytes of packet of length %d\n", sent, pkt_len); | |
return 0; | |
} | |
return 1; | |
} | |
struct ethhdr* CreateEthernetHeader(char *src_mac, char *dst_mac, int protocol) | |
{ | |
struct ethhdr *ethernet_header; | |
ethernet_header = (struct ethhdr *)malloc(sizeof(struct ethhdr)); | |
/* copy the Src mac addr */ | |
memcpy(ethernet_header->h_source, (void *)ether_aton(src_mac), 6); | |
/* copy the Dst mac addr */ | |
memcpy(ethernet_header->h_dest, (void *)ether_aton(dst_mac), 6); | |
/* copy the protocol */ | |
ethernet_header->h_proto = htons(protocol); | |
/* done ...send the header back */ | |
return (ethernet_header); | |
} | |
/* Ripped from Richard Stevans Book */ | |
unsigned short ComputeChecksum(unsigned char *data, int len) | |
{ | |
long sum = 0; /* assume 32 bit long, 16 bit short */ | |
unsigned short *temp = (unsigned short *)data; | |
while(len > 1){ | |
sum += *temp++; | |
if(sum & 0x80000000) /* if high order bit set, fold */ | |
sum = (sum & 0xFFFF) + (sum >> 16); | |
len -= 2; | |
} | |
if(len) /* take care of left over byte */ | |
sum += (unsigned short) *((unsigned char *)temp); | |
while(sum>>16) | |
sum = (sum & 0xFFFF) + (sum >> 16); | |
return ~sum; | |
} | |
struct iphdr *CreateIPHeader(/* Customize this as an exercise */) | |
{ | |
struct iphdr *ip_header; | |
ip_header = (struct iphdr *)malloc(sizeof(struct iphdr)); | |
ip_header->version = 4; | |
ip_header->ihl = (sizeof(struct iphdr))/4 ; | |
ip_header->tos = 0; | |
ip_header->tot_len = htons(sizeof(struct iphdr) + sizeof(struct tcphdr) + DATA_SIZE); | |
ip_header->id = htons(111); | |
ip_header->frag_off = 0; | |
ip_header->ttl = 111; | |
ip_header->protocol = IPPROTO_TCP; | |
ip_header->check = 0; /* We will calculate the checksum later */ | |
(in_addr_t)ip_header->saddr = inet_addr(SRC_IP); | |
(in_addr_t)ip_header->daddr = inet_addr(DST_IP); | |
/* Calculate the IP checksum now : | |
The IP Checksum is only over the IP header */ | |
ip_header->check = ComputeChecksum((unsigned char *)ip_header, ip_header->ihl*4); | |
return (ip_header); | |
} | |
struct tcphdr *CreateTcpHeader(/* Customization Exercise */) | |
{ | |
struct tcphdr *tcp_header; | |
/* Check /usr/include/linux/tcp.h for header definiation */ | |
tcp_header = (struct tcphdr *)malloc(sizeof(struct tcphdr)); | |
tcp_header->source = htons(SRC_PORT); | |
tcp_header->dest = htons(DST_PORT); | |
tcp_header->seq = htonl(111); | |
tcp_header->ack_seq = htonl(111); | |
tcp_header->res1 = 0; | |
tcp_header->doff = (sizeof(struct tcphdr))/4; | |
tcp_header->syn = 1; | |
tcp_header->window = htons(100); | |
tcp_header->check = 0; /* Will calculate the checksum with pseudo-header later */ | |
tcp_header->urg_ptr = 0; | |
return (tcp_header); | |
} | |
CreatePseudoHeaderAndComputeTcpChecksum(struct tcphdr *tcp_header, struct iphdr *ip_header, unsigned char *data) | |
{ | |
/*The TCP Checksum is calculated over the PseudoHeader + TCP header +Data*/ | |
/* Find the size of the TCP Header + Data */ | |
int segment_len = ntohs(ip_header->tot_len) - ip_header->ihl*4; | |
/* Total length over which TCP checksum will be computed */ | |
int header_len = sizeof(PseudoHeader) + segment_len; | |
/* Allocate the memory */ | |
unsigned char *hdr = (unsigned char *)malloc(header_len); | |
/* Fill in the pseudo header first */ | |
PseudoHeader *pseudo_header = (PseudoHeader *)hdr; | |
pseudo_header->source_ip = ip_header->saddr; | |
pseudo_header->dest_ip = ip_header->daddr; | |
pseudo_header->reserved = 0; | |
pseudo_header->protocol = ip_header->protocol; | |
pseudo_header->tcp_length = htons(segment_len); | |
/* Now copy TCP */ | |
memcpy((hdr + sizeof(PseudoHeader)), (void *)tcp_header, tcp_header->doff*4); | |
/* Now copy the Data */ | |
memcpy((hdr + sizeof(PseudoHeader) + tcp_header->doff*4), data, DATA_SIZE); | |
/* Calculate the Checksum */ | |
tcp_header->check = ComputeChecksum(hdr, header_len); | |
/* Free the PseudoHeader */ | |
free(hdr); | |
return ; | |
} | |
unsigned char *CreateData(int len) | |
{ | |
unsigned char *data = (unsigned char *)malloc(len); | |
struct timeval tv; | |
struct timezone tz; | |
int counter = len; | |
/* get time of the day */ | |
gettimeofday(&tv, &tz); | |
/* seed the random number generator */ | |
srand(tv.tv_sec); | |
/* Add random data for now */ | |
for(counter = 0 ; counter < len; counter++) | |
data[counter] = 255.0 *rand()/(RAND_MAX +1.0); | |
return data; | |
} | |
/* argv[1] is the device e.g. eth0 */ | |
main(int argc, char **argv) | |
{ | |
int raw; | |
unsigned char *packet; | |
struct ethhdr* ethernet_header; | |
struct iphdr *ip_header; | |
struct tcphdr *tcp_header; | |
unsigned char *data; | |
int pkt_len; | |
/* Create the raw socket */ | |
raw = CreateRawSocket(ETH_P_ALL); | |
/* Bind raw socket to interface */ | |
BindRawSocketToInterface(argv[1], raw, ETH_P_ALL); | |
/* create Ethernet header */ | |
ethernet_header = CreateEthernetHeader(SRC_ETHER_ADDR, DST_ETHER_ADDR, ETHERTYPE_IP); | |
/* Create IP Header */ | |
ip_header = CreateIPHeader(); | |
/* Create TCP Header */ | |
tcp_header = CreateTcpHeader(); | |
/* Create Data */ | |
data = CreateData(DATA_SIZE); | |
/* Create PseudoHeader and compute TCP Checksum */ | |
CreatePseudoHeaderAndComputeTcpChecksum(tcp_header, ip_header, data); | |
/* Packet length = ETH + IP header + TCP header + Data*/ | |
pkt_len = sizeof(struct ethhdr) + ntohs(ip_header->tot_len); | |
/* Allocate memory */ | |
packet = (unsigned char *)malloc(pkt_len); | |
/* Copy the Ethernet header first */ | |
memcpy(packet, ethernet_header, sizeof(struct ethhdr)); | |
/* Copy the IP header -- but after the ethernet header */ | |
memcpy((packet + sizeof(struct ethhdr)), ip_header, ip_header->ihl*4); | |
/* Copy the TCP header after the IP header */ | |
memcpy((packet + sizeof(struct ethhdr) + ip_header->ihl*4),tcp_header, tcp_header->doff*4); | |
/* Copy the Data after the TCP header */ | |
memcpy((packet + sizeof(struct ethhdr) + ip_header->ihl*4 + tcp_header->doff*4), data, DATA_SIZE); | |
/* send the packet on the wire */ | |
if(!SendRawPacket(raw, packet, pkt_len)) | |
{ | |
perror("Error sending packet"); | |
} | |
else | |
printf("Packet sent successfully\n"); | |
/* Free the headers back to the heavenly heap */ | |
free(ethernet_header); | |
free(ip_header); | |
free(tcp_header); | |
free(data); | |
free(packet); | |
close(raw); | |
return 0; | |
} | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hello
Thanks for this Democode. I can see the injected packets on wireshark, however the injected SYN packet don't get processed, there comes no SYN, ACK response. (There is a TCP Service listening on this Port.) Do you have any idea what could be the Problem?
I asked this problem here at stackoverflow:
http://stackoverflow.com/questions/37896521/locally-injected-tcp-traffic-does-not-get-processed