libwifi.py 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198
  1. # Copyright (c) 2017, Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
  2. #
  3. # This code may be distributed under the terms of the BSD license.
  4. # See README for more details.
  5. from scapy.all import *
  6. from Cryptodome.Cipher import AES
  7. from datetime import datetime
  8. #### Basic output and logging functionality ####
  9. ALL, DEBUG, INFO, STATUS, WARNING, ERROR = range(6)
  10. COLORCODES = { "gray" : "\033[0;37m",
  11. "green" : "\033[0;32m",
  12. "orange": "\033[0;33m",
  13. "red" : "\033[0;31m" }
  14. global_log_level = INFO
  15. def log(level, msg, color=None, showtime=True):
  16. if level < global_log_level: return
  17. if level == DEBUG and color is None: color="gray"
  18. if level == WARNING and color is None: color="orange"
  19. if level == ERROR and color is None: color="red"
  20. print (datetime.now().strftime('[%H:%M:%S] ') if showtime else " "*11) + COLORCODES.get(color, "") + msg + "\033[1;0m"
  21. #### Packet Processing Functions ####
  22. class DHCP_sock(DHCP_am):
  23. def __init__(self, **kwargs):
  24. self.sock = kwargs.pop("sock")
  25. self.server_ip = kwargs["gw"]
  26. super(DHCP_sock, self).__init__(**kwargs)
  27. def make_reply(self, req):
  28. rep = super(DHCP_sock, self).make_reply(req)
  29. # Fix scapy bug: set broadcast IP if required
  30. if rep is not None and BOOTP in req and IP in rep:
  31. if req[BOOTP].flags & 0x8000 != 0 and req[BOOTP].giaddr == '0.0.0.0' and req[BOOTP].ciaddr == '0.0.0.0':
  32. rep[IP].dst = "255.255.255.255"
  33. # Explicitly set source IP if requested
  34. if not self.server_ip is None:
  35. rep[IP].src = self.server_ip
  36. return rep
  37. def send_reply(self, reply):
  38. self.sock.send(reply, **self.optsend)
  39. def print_reply(self, req, reply):
  40. log(STATUS, "%s: DHCP reply %s to %s" % (reply.getlayer(Ether).dst, reply.getlayer(BOOTP).yiaddr, reply.dst), color="green")
  41. def remove_client(self, clientmac):
  42. clientip = self.leases[clientmac]
  43. self.pool.append(clientip)
  44. del self.leases[clientmac]
  45. class ARP_sock(ARP_am):
  46. def __init__(self, **kwargs):
  47. self.sock = kwargs.pop("sock")
  48. super(ARP_am, self).__init__(**kwargs)
  49. def send_reply(self, reply):
  50. self.sock.send(reply, **self.optsend)
  51. def print_reply(self, req, reply):
  52. log(STATUS, "%s: ARP: %s ==> %s on %s" % (reply.getlayer(Ether).dst, req.summary(), reply.summary(), self.iff))
  53. #### Packet Processing Functions ####
  54. class MitmSocket(L2Socket):
  55. def __init__(self, **kwargs):
  56. super(MitmSocket, self).__init__(**kwargs)
  57. def send(self, p):
  58. # Hack: set the More Data flag so we can detect injected frames (and so clients stay awake longer)
  59. p[Dot11].FCfield |= 0x20
  60. L2Socket.send(self, RadioTap()/p)
  61. def _strip_fcs(self, p):
  62. # Scapy can't handle the optional Frame Check Sequence (FCS) field automatically
  63. if p[RadioTap].present & 2 != 0:
  64. rawframe = str(p[RadioTap])
  65. pos = 8
  66. while ord(rawframe[pos - 1]) & 0x80 != 0: pos += 4
  67. # If the TSFT field is present, it must be 8-bytes aligned
  68. if p[RadioTap].present & 1 != 0:
  69. pos += (8 - (pos % 8))
  70. pos += 8
  71. # Remove FCS if present
  72. if ord(rawframe[pos]) & 0x10 != 0:
  73. return Dot11(str(p[Dot11])[:-4])
  74. return p[Dot11]
  75. def recv(self, x=MTU):
  76. p = L2Socket.recv(self, x)
  77. if p == None or not Dot11 in p: return None
  78. # Hack: ignore frames that we just injected and are echoed back by the kernel
  79. if p[Dot11].FCfield & 0x20 != 0:
  80. return None
  81. # Strip the FCS if present, and drop the RadioTap header
  82. return self._strip_fcs(p)
  83. def close(self):
  84. super(MitmSocket, self).close()
  85. def dot11_get_seqnum(p):
  86. return p[Dot11].SC >> 4
  87. def dot11_get_iv(p):
  88. """Scapy can't handle Extended IVs, so do this properly ourselves (only works for CCMP)"""
  89. if Dot11WEP not in p:
  90. log(ERROR, "INTERNAL ERROR: Requested IV of plaintext frame")
  91. return 0
  92. wep = p[Dot11WEP]
  93. if wep.keyid & 32:
  94. # FIXME: Only CCMP is supported (TKIP uses a different IV structure)
  95. return ord(wep.iv[0]) + (ord(wep.iv[1]) << 8) + (struct.unpack(">I", wep.wepdata[:4])[0] << 16)
  96. else:
  97. return ord(wep.iv[0]) + (ord(wep.iv[1]) << 8) + (ord(wep.iv[2]) << 16)
  98. def get_tlv_value(p, type):
  99. if not Dot11Elt in p: return None
  100. el = p[Dot11Elt]
  101. while isinstance(el, Dot11Elt):
  102. if el.ID == type:
  103. return el.info
  104. el = el.payload
  105. return None
  106. def dot11_get_priority(p):
  107. if not Dot11QoS in p: return 0
  108. return ord(str(p[Dot11QoS])[0])
  109. #### Crypto functions and util ####
  110. def get_ccmp_payload(p):
  111. # Extract encrypted payload:
  112. # - Skip extended IV (4 bytes in total)
  113. # - Exclude first 4 bytes of the CCMP MIC (note that last 4 are saved in the WEP ICV field)
  114. return str(p.wepdata[4:-4])
  115. def decrypt_ccmp(p, key):
  116. payload = get_ccmp_payload(p)
  117. sendermac = p[Dot11].addr2
  118. priority = dot11_get_priority(p)
  119. iv = dot11_get_iv(p)
  120. pn = struct.pack(">I", iv >> 16) + struct.pack(">H", iv & 0xFFFF)
  121. nonce = chr(priority) + sendermac.replace(':','').decode("hex") + pn
  122. cipher = AES.new(key, AES.MODE_CCM, nonce, mac_len=8)
  123. plaintext = cipher.decrypt(payload)
  124. return plaintext
  125. class IvInfo():
  126. def __init__(self, p):
  127. self.iv = dot11_get_iv(p)
  128. self.seq = dot11_get_seqnum(p)
  129. self.time = p.time
  130. def is_reused(self, p):
  131. """Return true if frame p reuses an IV and if p is not a retransmitted frame"""
  132. iv = dot11_get_iv(p)
  133. seq = dot11_get_seqnum(p)
  134. return self.iv == iv and self.seq != seq and p.time >= self.time + 1
  135. class IvCollection():
  136. def __init__(self):
  137. self.ivs = dict() # maps IV values to IvInfo objects
  138. def reset(self):
  139. self.ivs = dict()
  140. def track_used_iv(self, p):
  141. iv = dot11_get_iv(p)
  142. self.ivs[iv] = IvInfo(p)
  143. def is_iv_reused(self, p):
  144. """Returns True if this is an *observed* IV reuse and not just a retransmission"""
  145. iv = dot11_get_iv(p)
  146. return iv in self.ivs and self.ivs[iv].is_reused(p)
  147. def is_new_iv(self, p):
  148. """Returns True if the IV in this frame is higher than all previously observed ones"""
  149. iv = dot11_get_iv(p)
  150. if len(self.ivs) == 0: return True
  151. return iv > max(self.ivs.keys())