This is a low-level network debugging utility that utilizes raw packet i/o to construct and deconstruct tcp, udp, ipv4, arp, and icmp packets over ethernet.

Dependencies:   mbed

scanner.h

Committer:
etherealflaim
Date:
2010-10-12
Revision:
0:d494b853ce97
Child:
4:88fc7fa58931

File content as of revision 0:d494b853ce97:

#ifndef SCANNER_H
#define SCANNER_H

#include "main.h"
#include "net/net.h"
#include "util/log.h"
#include "sniffer.h"

#include <cstring>
#include <set>

#define SCANNER_PADSIZE   0
#define SCANNER_FRAMESIZE (sizeof(Ethernet_FrameHeader) + sizeof(IP_PacketHeader) + sizeof(TCP_SegmentHeader) + SCANNER_PADSIZE)

class Scanner
{
private:
  Sniffer *sniffer;
  Ticker scan_timer;
  Timeout scan_timeout;
  
  u8 raw_frame[SCANNER_FRAMESIZE];
  
  IP_Address destip;
  u16 port_idx;
  u16 pseudo_checksum;
  
  set<u16> open_ports;
  
  LocalFileSystem local;

public:
  inline Scanner(Sniffer *_sniffer)
  : sniffer(_sniffer), local("local")
  {
    sniffer->attach_tcp(this, &Scanner::handle_tcp);
  }
  
  inline void handle_tcp(TCP_SegmentHeader *packet, u32 data_bytes)
  {
    if (packet->syn && packet->ack)
    {
      open_ports.insert(packet->source_port);
    }
  }
  
  inline void finish()
  {
    FILE *fp = fopen("/local/PortScan.txt", "w");
    fprintf(fp, "Open Ports on %d.%d.%d.%d:\n", destip.octet[0], destip.octet[1], destip.octet[2], destip.octet[3]);
    for (set<u16>::iterator iter = open_ports.begin(); iter != open_ports.end(); ++iter)
    {
      fprintf(fp, "  TCP:%-5d OPEN\n", *iter);
    }
    fclose(fp);  
    
    main_log.printf("Open ports:");
    for (set<u16>::iterator iter = open_ports.begin(); iter != open_ports.end(); ++iter)
    {
      main_log.printf("  TCP:%-5d OPEN", *iter);
    }
    main_log.printf("Port scan complete.");
  }
  
  inline void start(Ethernet_MAC src, Ethernet_MAC dst, IP_Address srcip, IP_Address dstip)
  {
    // Create the ethernet frame, IP packet, and TCP segment memory mapping
    static Ethernet_FrameHeader *frame = (Ethernet_FrameHeader*)raw_frame;
    static IP_PacketHeader *packet = (IP_PacketHeader*)frame->payload;
    static TCP_SegmentHeader *segment = (TCP_SegmentHeader*)packet->data;
    
    destip = dstip;
    main_log.printf("Starting TCP port scan of %d.%d.%d.%d...", dstip.octet[0], dstip.octet[1], dstip.octet[2], dstip.octet[3]);
    
    // Zero the frame
    memset(raw_frame, '\0', SCANNER_FRAMESIZE);
    
    //sniffer->inject(dst, frame->ethertype, packet, 0); //sizeof(raw_frame)-sizeof(Ethernet_FrameHeader));

    // Fill in the frame (constant for all TCP connections)
    frame->destination = dst;
    frame->source = src;
    frame->ethertype = ETHERTYPE_IPV4;
    
    // Fill in the IP packet
    packet->source = srcip; // Can't change with destination back-to-back? lol
    packet->version = 0x04;
    packet->header_bytes_div4 = 5; // *4 = 20
    packet->packet_bytes = SCANNER_FRAMESIZE-sizeof(Ethernet_FrameHeader);
    packet->ttl = 64;
    packet->protocol = IPPROTO_TCP;
    packet->destination = dstip;
    
    // Fill in the TCP segment
    segment->sequence_number = 0xBADBEEF0;
    segment->data_offset_bytes_div4 = sizeof(TCP_SegmentHeader)/4;
    segment->syn = 1;
    segment->window_size = 8192;
    pseudo_checksum = pseudo_header_checksum(srcip, dstip, sizeof(TCP_SegmentHeader));
    
    // Initialize the scanning
    port_idx = 0;
    
    open_ports.clear();
    scan_timer.attach_us(this, &Scanner::scan, 50);
    //scan();
  }
  
  inline void scan()
  {
    static u16 ports[] = {1, 2, 3, 5, 7, 9, 11, 13, 17, 18, 19, 20, 21, 22, 23, 24, 25, 35, 37, 39,
      41, 42, 43, 47, 49, 50, 51, 52, 53, 54, 56, 58, 70, 79, 80, 83, 88, 90, 101, 102,
      104, 105, 107, 108, 109, 110, 111, 113, 113, 115, 117, 118, 119, 135, 137, 138, 139, 143, 152, 153,
      156, 162, 170, 177, 179, 194, 199, 201, 209, 210, 213, 218, 220, 259, 264, 308, 311, 318, 350, 351,
      366, 369, 371, 383, 384, 387, 389, 401, 427, 443, 444, 445, 464, 475, 497, 504, 512, 513, 514, 515,
      520, 524, 530, 532, 540, 542, 543, 544, 546, 547, 548, 554, 556, 563, 587, 591, 593, 604, 631, 635,
      636, 639, 641, 646, 647, 648, 653, 654, 657, 660, 674, 691, 692, 694, 695, 699, 700, 701, 702, 706,
      711, 712, 749, 750, 751, 752, 753, 754, 760, 860, 873, 902, 989, 990, 991, 992, 993, 995, 1058,
      1080, 1085, 1098, 1099, 1140, 1169, 1176, 1182, 1194, 1198, 1200, 1214, 1220, 1223, 1241, 1270, 1293, 1337, 1352, 1387,
      1414, 1417, 1418, 1419, 1420, 1431, 1433, 1470, 1494, 1512, 1513, 1521, 1524, 1533, 1547, 1677, 1720, 1723, 1755, 1761,
      1762, 1763, 1764, 1765, 1766, 1767, 1768, 1801, 1812, 1813, 1863, 1935, 1947, 1970, 1971, 1972, 1984, 1994, 1998, 2000,
      2031, 2053, 2073, 2074, 2082, 2083, 2086, 2102, 2103, 2104, 2105, 2144, 2145, 2161, 2181, 2210, 2211, 2212, 2219, 2220,
      2261, 2262, 2369, 2370, 2404, 2447, 2483, 2484, 2500, 2612, 2713, 2714, 2735, 2809, 2868, 2947, 2948, 2949, 3050, 3051,
      3074, 3225, 3233, 3235, 3260, 3268, 3269, 3283, 3305, 3306, 3386, 3389, 3396, 3412, 3455, 3423, 3424, 3478, 3483, 3516,
      3532, 3533, 3606, 3632, 3689, 3690, 3702, 3880, 3868, 3900, 3945, 3999, 4018, 4089, 4093, 4096, 4111, 4116, 4321, 4662,
      4728, 4840, 4843, 4847, 4993, 4894, 4899, 4950, 5000, 5001, 5003, 5004, 5005, 5051, 5060, 5061, 5070, 5084, 5085, 5099,
      5151, 5154, 5190, 5222, 5269, 5298, 5351, 5355, 5402, 5405, 5421, 5432, 5556, 5631, 5814, 5900, 5984, 5999, 6000, 6005,
      6086, 6110, 6111, 6112, 6129, 6346, 6347, 6350, 6432, 6444, 6445, 6619, 6665, 6666, 6667, 6668, 6669, 6888, 6969, 7005,
      7006, 7400, 7401, 7402, 7547, 7787, 7788, 8000, 8008, 8078, 8080, 8118, 8123, 8243, 8280, 8400, 8442, 8880, 8888, 9009,
      9080, 9100, 9105, 9119, 9306, 9312, 9418, 9535, 9536, 9800, 9898, 9996, 10008, 10010, 10050, 10051, 10113, 10114, 10115,
      10116, 13076, 13720, 13721, 13724, 13782, 13783, 13785, 13786, 15000, 15345, 17500, 18104, 19283, 19315, 22347, 22350,
      24465, 24554, 26000, 31457, 33434, 40000, 43047, 43048, 47808};
    
    // Create the ethernet frame, IP packet, and TCP segment memory mapping
    static Ethernet_FrameHeader *frame = (Ethernet_FrameHeader*)raw_frame;
    static IP_PacketHeader *packet = (IP_PacketHeader*)frame->payload;
    static TCP_SegmentHeader *segment = (TCP_SegmentHeader*)packet->data;
    
    segment->source_port = port_idx; //ports[port_idx];
    segment->destination_port = port_idx; //ports[port_idx];
    
    fix_endian_tcp(segment);
    segment->checksum = checksum(segment, sizeof(TCP_SegmentHeader), &segment->checksum, sizeof(segment->checksum), pseudo_checksum);
    
    fix_endian_ip(packet);
    packet->header_checksum = checksum(packet, sizeof(IP_PacketHeader), &packet->header_checksum, sizeof(packet->header_checksum));
    
    fix_endian_ethernet(frame);
    sniffer->inject(frame, SCANNER_FRAMESIZE);
    
    fix_endian_ethernet(frame);
    fix_endian_ip(packet);
    fix_endian_tcp(segment);
    
    // Update sequence number
    segment->sequence_number++;
    
    //if (port_idx >= sizeof(ports)/sizeof(u16)) scan_timer.detach();
    if (port_idx >= 65535)
    {
      scan_timer.detach();
      scan_timeout.attach(this, &Scanner::finish, 7);
    }
    port_idx++;
  }
};

#endif