用python模擬TCP3次握手鍊接及發送數據

源碼以下:html

 1 from scapy.all import *
 2 
 3 
 4 import logging
 5 logging.getLogger('scapy.runtime').setLevel(logging.ERROR)
 6 
 7 target_ip       = '192.168.1.1'
 8 target_port     = 80
 9 data            = 'GET / HTTP/1.0 \r\n\r\n'
10 
11 def start_tcp(target_ip,target_port):
12     global sport,s_seq,d_seq    #主要是用於TCP3此握手創建鏈接後繼續發送數據
13     try:
14         #第一次握手,發送SYN包
15         ans = sr1(IP(dst=target_ip)/TCP(dport=target_port,sport=RandShort(),seq=RandInt(),flags='S'),verbose=False)
16         sport = ans[TCP].dport   #源隨機端口
17         s_seq = ans[TCP].ack     #源序列號(其實初始值已經被服務端加1)
18         d_seq = ans[TCP].seq + 1 #確認號,須要把服務端的序列號加1
19         #第三次握手,發送ACK確認包
20         send(IP(dst=target_ip)/TCP(dport=target_port,sport=sport,ack=d_seq,seq=s_seq,flags='A'),verbose=False)
21     except Exception,e:
22         print '[-]有錯誤,請注意檢查!'
23         print e
24 
25 def trans_data(target_ip,target_port,data):
26     #先創建TCP鏈接
27     start_tcp(target_ip=target_ip,target_port=target_port)
28     #print sport,s_seq,d_seq
29     #發起GET請求
30     ans = sr1(IP(dst=target_ip)/TCP(dport=target_port,sport=sport,seq=s_seq,ack=d_seq,flags=24)/data,verbose=False)
31     #ans.show()
32     #讀取服務端發來的數據
33     rcv = ans[Raw]
34     print rcv
35 
36 if __name__ == '__main__':
37     #start_tcp(target_ip,target_port)
38     trans_data(target_ip,target_port,data)

 

運行結果以下:python

1 # python exp3.py
2 <meta http-equiv="Pragma" content="no-cache">
3 <meta http-equiv="Expires" content="wed, 26 Feb 1997 08:21:57 GMT">
4 <html><head><title>505 HTTP Version not supported</title></head><body><center><h1>505 HTTP Version not supported</h1></center></body></html>�p�-1���-1��2��2��D��o�p�-1��`��D

wireshark抓包截圖以下:tcp

相關文章
相關標籤/搜索