libwifi.py 2.0 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273
  1. # Copyright (c) 2017, Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
  2. #
  3. # This code may be distributed under the terms of the BSD license.
  4. # See README for more details.
  5. from scapy.all import *
  6. #### Packet Processing Functions ####
  7. class MitmSocket(L2Socket):
  8. def __init__(self, **kwargs):
  9. super(MitmSocket, self).__init__(**kwargs)
  10. def send(self, p):
  11. # Hack: set the More Data flag so we can detect injected frames (and so clients stay awake longer)
  12. p[Dot11].FCfield |= 0x20
  13. L2Socket.send(self, RadioTap()/p)
  14. def _strip_fcs(self, p):
  15. # Scapy can't handle the optional Frame Check Sequence (FCS) field automatically
  16. if p[RadioTap].present & 2 != 0:
  17. rawframe = str(p[RadioTap])
  18. pos = 8
  19. while ord(rawframe[pos - 1]) & 0x80 != 0: pos += 4
  20. # If the TSFT field is present, it must be 8-bytes aligned
  21. if p[RadioTap].present & 1 != 0:
  22. pos += (8 - (pos % 8))
  23. pos += 8
  24. # Remove FCS if present
  25. if ord(rawframe[pos]) & 0x10 != 0:
  26. return Dot11(str(p[Dot11])[:-4])
  27. return p[Dot11]
  28. def recv(self, x=MTU):
  29. p = L2Socket.recv(self, x)
  30. if p == None or not Dot11 in p: return None
  31. # Hack: ignore frames that we just injected and are echoed back by the kernel
  32. if p[Dot11].FCfield & 0x20 != 0:
  33. return None
  34. # Strip the FCS if present, and drop the RadioTap header
  35. return self._strip_fcs(p)
  36. def close(self):
  37. super(MitmSocket, self).close()
  38. def dot11_get_seqnum(p):
  39. return p[Dot11].SC >> 4
  40. def dot11_get_iv(p):
  41. """Scapy can't handle Extended IVs, so do this properly ourselves (only works for CCMP)"""
  42. if Dot11WEP not in p:
  43. log(ERROR, "INTERNAL ERROR: Requested IV of plaintext frame")
  44. return 0
  45. wep = p[Dot11WEP]
  46. if wep.keyid & 32:
  47. return ord(wep.iv[0]) + (ord(wep.iv[1]) << 8) + (struct.unpack(">I", wep.wepdata[:4])[0] << 16)
  48. else:
  49. return ord(wep.iv[0]) + (ord(wep.iv[1]) << 8) + (ord(wep.iv[2]) << 16)
  50. def get_tlv_value(p, type):
  51. if not Dot11Elt in p: return None
  52. el = p[Dot11Elt]
  53. while isinstance(el, Dot11Elt):
  54. if el.ID == type:
  55. return el.info
  56. el = el.payload
  57. return None