def test_fallback(): """ Tests fallback behavior. """ fragment = actions.fragment.FragmentAction(correct_order=False, fragsize=2, segment=False) assert str(fragment) == "fragment{ip:2:False}", "Fragment returned incorrect string representation: %s" % str(fragment) fragment.parse("fragment{ip:0:False}", logger) packet = actions.packet.Packet(IP(src="127.0.0.1", dst="127.0.0.1", proto=0x06)/UDP(sport=2222, dport=3333, chksum=0x4444)/("thisissomedata")) packet1, packet2 = fragment.run(packet, logger) assert id(packet1) != id(packet2), "Duplicate aliased packet objects" assert str(packet1) == str(packet2) fragment.parse("fragment{tcp:-1:False}", logger) packet = actions.packet.Packet(IP(src="127.0.0.1", dst="127.0.0.1", proto=0x06)/UDP(sport=2222, dport=3333, chksum=0x4444)/("thisissomedata")) packet1, packet2 = fragment.run(packet, logger) assert id(packet1) != id(packet2), "Duplicate aliased packet objects" assert str(packet1) == str(packet2) fragment.parse("fragment{tcp:-1:False}", logger) packet = actions.packet.Packet(IP(src="127.0.0.1", dst="127.0.0.1", proto=0x06)/TCP(sport=2222, dport=3333, chksum=0x4444)) packet1, packet2 = fragment.run(packet, logger) assert id(packet1) != id(packet2), "Duplicate aliased packet objects" assert str(packet1) == str(packet2) fragment.parse("fragment{ip:-1:False}", logger) packet = actions.packet.Packet(IP(src="127.0.0.1", dst="127.0.0.1", proto=0x06)) packet1, packet2 = fragment.run(packet, logger) assert id(packet1) != id(packet2), "Duplicate aliased packet objects" assert str(packet1) == str(packet2)
def test_ip_only_fragment(): """ Tests fragmentation without higher protocols. """ fragment = actions.fragment.FragmentAction(correct_order=True) fragment.parse("fragment{ip:-1:True}", logger) packet = actions.packet.Packet(IP(src="127.0.0.1", dst="127.0.0.1")/("datadata11datadata")) packet1, packet2 = fragment.run(packet, logger) assert id(packet1) != id(packet2), "Duplicate aliased packet objects" assert packet1["Raw"].load != packet2["Raw"].load, "Packets were not different" assert packet1["Raw"].load == b'datadata', "Left packet incorrectly fragmented" assert packet2["Raw"].load == b"11datadata", "Right packet incorrectly fragmented"
def test_mutate(logger): """ Tests mutating the fragment action """ fragment = actions.fragment.FragmentAction(correct_order=False, fragsize=2, segment=False) assert str( fragment ) == "fragment{ip:2:False}", "Fragment returned incorrect string representation: %s" % str( fragment) for _ in range(0, 200): fragment.mutate() fragment.parse(str(fragment), logger) packet = layers.packet.Packet( IP(src="127.0.0.1", dst="127.0.0.1", proto=0x06) / TCP(sport=2222, dport=3333, chksum=0x4444) / ("thisissomedata")) packet1, packet2 = fragment.run(packet, logger)
def test_overlapping_segment_out_of_bounds(): """ Basic test for overlapping segments overlapping beyond the edge of the packet. """ fragment = actions.fragment.FragmentAction(correct_order=True) fragment.parse("fragment{tcp:-1:True:20}", logger) packet = layers.packet.Packet( IP(src="127.0.0.1", dst="127.0.0.1") / TCP(seq=100) / ("datadata11datadata")) packet1, packet2 = fragment.run(packet, logger) assert id(packet1) != id(packet2), "Duplicate aliased packet objects" assert packet1["Raw"].load != packet2[ "Raw"].load, "Packets were not different" assert packet1[ "Raw"].load == b'datadata11datadata', "Left packet incorrectly segmented" assert packet2[ "Raw"].load == b"1datadata", "Right packet incorrectly fragmented" assert packet1["TCP"].seq == 100, "First packet sequence number incorrect" assert packet2["TCP"].seq == 109, "Second packet sequence number incorrect"
def test_parse(): """ Tests parsing. """ fragment = actions.fragment.FragmentAction(correct_order=False, fragsize=2, segment=False) assert str(fragment) == "fragment{ip:2:False}", "Fragment returned incorrect string representation: %s" % str(fragment) fragment.parse("fragment{tcp:5:False}", logger) assert fragment.correct_order == False assert fragment.fragsize == 5 assert fragment.segment == True with pytest.raises(Exception): fragment.parse("fragment{tcp:5}", logger) with pytest.raises(Exception): fragment.parse("fragment{tcp:a:True}", logger) assert fragment.correct_order == False assert fragment.fragsize == 5 assert fragment.segment == True fragment = actions.fragment.FragmentAction() assert fragment.correct_order in [True, False] packet = actions.packet.Packet(IP(src="127.0.0.1", dst="127.0.0.1")/TCP(sport=2222, dport=3333, seq=100, ack=100, flags="S")) strat = actions.utils.parse("[IP:proto:6:0]-tamper{IP:proto:replace:6}(fragment{ip:-1:True}(tamper{TCP:dataofs:replace:8}(duplicate,),tamper{IP:frag:replace:0}),)-| [IP:tos:0:0]-duplicate-| \/", logger) strat.act_on_packet(packet, logger) packet = actions.packet.Packet(IP(src="127.0.0.1", dst="127.0.0.1")/UDP(sport=2222, dport=3333, chksum=0x4444)) strat = actions.utils.parse("[IP:proto:6:0]-tamper{IP:proto:replace:6}(fragment{ip:-1:True}(tamper{TCP:dataofs:replace:8}(duplicate,),tamper{IP:frag:replace:0}),)-| [IP:tos:0:0]-duplicate-| \/", logger) strat.act_on_packet(packet, logger) packet = actions.packet.Packet(IP(src="127.0.0.1", dst="127.0.0.1")/TCP(sport=2222, dport=3333, chksum=0x4444)) strat = actions.utils.parse("[TCP:urgptr:0]-tamper{TCP:options-altchksumopt:corrupt}(fragment{tcp:-1:True}(tamper{IP:proto:corrupt},tamper{TCP:seq:replace:654077552}),)-| \/", logger) strat.act_on_packet(packet, logger) strat = actions.utils.parse("[TCP:options-mss:]-tamper{TCP:load:replace:}(fragment{tcp:-1:True},)-| \/", logger) strat.act_on_packet(packet, logger) strat = actions.utils.parse("[TCP:options-mss:]-tamper{IP:frag:replace:1353}(tamper{TCP:load:replace:}(fragment{tcp:-1:True},),)-| \/", logger) strat.act_on_packet(packet, logger) strat = actions.utils.parse("[IP:ihl:5]-duplicate-| [TCP:options-mss:]-tamper{IP:frag:replace:1353}(fragment{tcp:-1:True}(tamper{TCP:load:replace:}(fragment{tcp:-1:False},),tamper{DNSQR:qtype:replace:45416}),)-| \/", logger) strat.act_on_packet(packet, logger) strat = actions.utils.parse("[DNSQR:qclass:25989]-duplicate(duplicate(tamper{DNSQR:qtype:replace:30882},),tamper{UDP:sport:replace:42042})-| [TCP:options-nop:]-tamper{TCP:options-nop:corrupt}(tamper{TCP:load:replace:mjkuskjzgy}(tamper{IP:frag:replace:410}(fragment{tcp:-1:True},),),)-| \/", logger) strat.act_on_packet(packet, logger)