packetStorm1.2

所属分类:控制台编程
开发工具:Perl
文件大小:7KB
下载次数:115
上传日期:2006-03-06 23:34:54
上 传 者gogoggo
说明:  可以列出当前系统支持的网络设备,分析ARP协议包,将设备设置到promisc模式,分析ARP协议包,打印更多数据、采用表格方式输出
(can summarize the current system to support the network equipment, ARP packet analysis, the equipment installed to promisc model analysis ARP packets, print more data, tabular output mode)

文件列表:
packetStorm.pl (18078, 2006-02-07)

//--\\ // __ //--\ // // // /== // //___/ //---//\ /-- //== /-- =/= \\__ =/= /-/ /\\ /\/\ / //-\\__// \_/__ /_ ///__/_/_/ \\_//\/\\ _/ ___// // \\ #帮助菜单 C:\Perl\scripts\Packetstorm>packetStorm.pl -? >>packetStorm.pl, V1.3 -?|-h|--help print help #打印帮助 -l|--list_device list supported device #列出系统支持的设备 -v|--verbose print more information #打印更多数据 -p|--promisc enable promisc #使用混杂模式 -n|--counter capture counter #抓包数量 -t|--pretty_table enable pretty table #使用文本表格方式打印结果 -d|--device select device #选择抓包设备 -e|--eth_type eth_type, arp or ip(default) #设置帧协议类型,arp 或ip -i|--ip_proto ip_proto, icmp udp or tcp(default) #设置三层协议类型 --arp_spa ARP, source protocol address #以下为各协议支持的Caputer Filters --arp_tpa ARP, target protocol address --arp_pa ARP, src/target protocol address --arp_opcode ARP, opcode, 1(Request) 2(Reply) --src_ip IP, source ip --dest_ip IP, destination ip --host IP, src/dest ip --icmp_type ICMP, icmp type --src_port TCP/UDP, source port --dest_port TCP/UDP, destination port --port TCP/UDP, src/dest port --tcp_flag TCP, tcp flag by shanleiguang@he.chinamobile.com, 2006/01 #列出当前系统支持的网络设备 C:\Perl\scripts\Packetstorm>packetStorm.pl -l +-----------------------------------------------------------------------------------+ | Supported Devices | +---+------+------------------------------------------------------------------------+ | 1 | dev | \Device\NPF_GenericDialupAdapter | +---+------+------------------------------------------------------------------------+ | | desc | Generic dialup adapter | +---+------+------------------------------------------------------------------------+ | 2 | dev | \Device\NPF_{5***1D162-D83C-4E2E-9057-3C1420D0D650} | +---+------+------------------------------------------------------------------------+ | | desc | Intel(R) PRO/100 VE Network Connection (Microsoft's Packet Scheduler) | +---+------+------------------------------------------------------------------------+ #选择2号设备,分析ARP协议包 C:\Perl\scripts\Packetstorm>packetStorm.pl -d 2 --eth_type arp +-----------------------------------------------------------------------------------+ | Selected Device | +---+------+------------------------------------------------------------------------+ | 2 | dev | \Device\NPF_{5***1D162-D83C-4E2E-9057-3C1420D0D650} | +---+------+------------------------------------------------------------------------+ | | desc | Intel(R) PRO/100 VE Network Connection (Microsoft's Packet Scheduler) | +---+------+------------------------------------------------------------------------+ 2006/02/07 11:14:44 , packets are storming... [1]. 00:E0:FC:47:85:45->00:00:00:00:00:00, xxx.xxx.xxx.33->xxx.xxx.xxx.58, ARP_REQUEST [2]. 00:E0:FC:47:85:45->00:00:00:00:00:00, xxx.xxx.xxx.33->xxx.xxx.xxx.40, ARP_REQUEST [3]. 08:00:46:CD:DE:A3->00:00:00:00:00:00, xxx.xxx.xxx.60->xxx.xxx.xxx.34, ARP_REQUEST [4]. 00:11:F9:C8:59:F1->08:00:46:CD:DE:A3, xxx.xxx.xxx.34->xxx.xxx.xxx.60, ARP_REPLY #选择2号设备,将设备设置到promisc模式,分析ARP协议包,打印更多数据、采用表格方式输出 C:\Perl\scripts\Packetstorm>packetStorm.pl -d 2 -vpt --eth_type arp +-----------------------------------------------------------------------------------+ | Selected Device | +---+------+------------------------------------------------------------------------+ | 2 | dev | \Device\NPF_{5***1D162-D83C-4E2E-9057-3C1420D0D650} | +---+------+------------------------------------------------------------------------+ | | desc | Intel(R) PRO/100 VE Network Connection (Microsoft's Packet Scheduler) | +---+------+------------------------------------------------------------------------+ 2006/02/07 11:31:08 , packets are storming... =No.1=========================================================================== +----------------------------------------------+ | Ethernet Frame Header | +-------------------+-------------------+------+ | src_mac | dest_mac | type | +-------------------+-------------------+------+ | 00:E0:FC:47:85:45 | FF:FF:FF:FF:FF:FF | 2054 | +-------------------+-------------------+------+ +------------------------------------------------------+ | ARP Header | +--------+-------------------+-----+-------------------+ | sha | 00:E0:FC:47:85:45 | tha | 00:00:00:00:00:00 | +--------+-------------------+-----+-------------------+ | spa | xxx.xxx.xxx.33 | tpa | xxx.xxx.xxx.40 | +--------+-------------------+-----+-------------------+ | opcode | ARP_REQUEST | - | - | +--------+-------------------+-----+-------------------+ ... .... #设置抓包总数为4,打印源地址或目的地址为xxx.xxx.xxx.33的ICMP消息 C:\Perl\scripts\Packetstorm>packetStorm.pl -d 2 -n 4 -vp --ip_proto icmp host xxx.xxx.xxx.33 +-----------------------------------------------------------------------------------+ | Selected Device | +---+------+------------------------------------------------------------------------+ | 2 | dev | \Device\NPF_{5***1D162-D83C-4E2E-9057-3C1420D0D650} | +---+------+------------------------------------------------------------------------+ | | desc | Intel(R) PRO/100 VE Network Connection (Microsoft's Packet Scheduler) | +---+------+------------------------------------------------------------------------+ 2006/02/07 11:31:52 , packets are storming... [1]. xxx.xxx.xxx.60->xxx.xxx.xxx.33, proto:1(ICMP), type:8(Echo) code:0 data:abcdefghijklmnopqrstuvwabcdefghi [2]. xxx.xxx.xxx.33->xxx.xxx.xxx.60, proto:1(ICMP), type:0(Echo Reply) code:0 data:abcdefghijklmnopqrstuvwabcdefghi [3]. xxx.xxx.xxx.60->xxx.xxx.xxx.33, proto:1(ICMP), type:8(Echo) code:0 data:abcdefghijklmnopqrstuvwabcdefghi [4]. xxx.xxx.xxx.33->xxx.xxx.xxx.60, proto:1(ICMP), type:0(Echo Reply) code:0 data:abcdefghijklmnopqrstuvwabcdefghi #分析端口为80有关的TCP数据包,并解析HTTP请求和响应 C:\Perl\scripts\Packetstorm>packetStorm.pl -d 2 -vp --port 80 +-----------------------------------------------------------------------------------+ | Selected Device | +---+------+------------------------------------------------------------------------+ | 2 | dev | \Device\NPF_{5***1D162-D83C-4E2E-9057-3C1420D0D650} | +---+------+------------------------------------------------------------------------+ | | desc | Intel(R) PRO/100 VE Network Connection (Microsoft's Packet Scheduler) | +---+------+------------------------------------------------------------------------+ 2006/02/07 11:32:28 , packets are storming... [1]. xxx.xxx.xxx.60:1461->***.233.189.104:80, proto:6(TCP) flags:2(SYN), seq:1803756956, ack:0 [2]. ***.233.189.104:80->xxx.xxx.xxx.60:1461, proto:6(TCP) flags:18(ACK|SYN), seq:3270740938, ack:1803756957 ? (Unknown code) [3]. xxx.xxx.xxx.60:1461->***.233.189.104:80, proto:6(TCP) flags:16(ACK), seq:1803756957, ack:3270740939 [4]. xxx.xxx.xxx.60:1461->***.233.189.104:80, proto:6(TCP) flags:24(ACK|PSH), seq:1803756957, ack:3270740939 GET /intl/zh-CN/ HTTP/1.1 Connection: Keep-Alive Accept: */* Accept-Encoding: gzip, deflate Accept-Language: zh-cn Host: www.google.com User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) Cookie: rememberme=true; SID=DQAAAG0AAABo695dhiPsrgNSPcjGe5QC9Lu9zghZ2fYaqGluOEgt-hDchwjTLWd80w kzmIS0laQfP2lHARL07ftgnlJWGB3QcekxL2me_RYeTS5bYVA9Oy3icUWk3eMrZFkkKhi9jY8IvTwO2QRqgOenSwxi6Z0C; PREF =ID=c169eba93e0c57bd:NW=1:TM=1139126941:LM=1139126941:GM=1:S=1N_Yf11M0uzWcd6J #分析目的端口为23的TCP数据包,并使用Telnet协议进行解析和打印(注意用户名和密码!) C:\Perl\scripts\Packetstorm>packetStorm.pl -d 2 -vp --dest_port 23 .... By shanleiguang@he.chinamobile.com, 2006/01

近期下载者

相关文件


收藏者