今日又无聊~~~感觉浏览器检查太麻烦,于是乎想搞个抓包脚本监听本地网卡~~~~代码贴上,复制即可使用~不行那就装个包哦!嘿嘿
- import os
- import dpkt
- import socket
- import datetime
- import uuid
-
- from scapy.sendrecv import sniff
- from scapy.utils import wrpcap
-
- def get_local_ip():
-
- hostname = socket.gethostname()
- # 获取本机内网ip
- local_ips = socket.gethostbyname_ex(hostname)[-1]
-
- return local_ips
-
- def body_transfer(body):
-
- str_body = body.decode()
-
- body_ls = str_body.split("&")
-
- for item in body_ls:
- key_, value_ = item.split("=")
- print(" %s: %s"% (key_, value_))
-
- def get_dpkt():
-
- dpkt_ = sniff(count = 100) #这里是针对单网卡的机子,多网卡的可以在参数中指定网卡,例:iface=Qualcomm QCA9377 802.11ac Wireless Adapter
- _uuid = uuid.uuid1()
- filename = f"{_uuid}.pcap"
- wrpcap(filename, dpkt_)
-
- return filename
-
- def print_pcap(pcap):
- try:
- local_ips = get_local_ip()
-
- for timestamp, buf in pcap:
- eth = dpkt.ethernet.Ethernet(buf) #获得以太包,即数据链路层包
- # print("ip layer:"+eth.data.__class__.__name__) #以太包的数据既是网络层包
- # print("tcp layer:"+eth.data.data.__class__.__name__) #网络层包的数据既是传输层包
- # print("http layer:" + eth.data.data.data.__class__.__name__) #传输层包的数据既是应用层包
- #
- # print('Timestamp: ',str(datetime.datetime.utcfromtimestamp(timestamp))) #打印出包的抓取时间
-
- if not isinstance(eth.data, dpkt.ip.IP):
- print('Non IP Packet type not supported %s' % eth.data.__class__.__name__)
- continue
- ip = eth.data
- src_ip = socket.inet_ntoa(ip.src)
- dst_ip = socket.inet_ntoa(ip.dst)
- do_not_fragment =bool(ip.off & dpkt.ip.IP_DF)
- more_fragments =bool(ip.off & dpkt.ip.IP_MF)
- fragment_offset = ip.off & dpkt.ip.IP_OFFMASK
-
- if isinstance(ip.data, dpkt.tcp.TCP):
-
- # Set the TCP data
- tcp = ip.data
-
- # Now see if we can parse the contents as a HTTP request
- # 看看是否可以将内容解析为HTTP请求
- try:
-
- request = dpkt.http.Request(tcp.data)
-
- print('IP: %s -> %s (len=%d ttl=%d DF=%d MF=%d offset=%d)' % (src_ip + "(本机)" if src_ip in local_ips else src_ip, dst_ip, ip.len, ip.ttl, do_not_fragment, more_fragments,fragment_offset))
-
- print("URL: %s" % request.headers.get("host") + request.uri)
- print("METHOD: %s" % request.method.upper())
- print("Headers: ")
- for key, value in request.headers.items():
- print(" %s: %s" %(key, value))
-
- print("Body:")
- body_transfer(request.body)
- print("Data:")
- body_transfer(request.data)
- # print('HTTP request: %s\n' % repr(request))
-
- print()
- except (dpkt.dpkt.NeedData, dpkt.dpkt.UnpackError):
- continue
-
- # Pull out fragment information (flags and offset all packed into off field, so use bitmasks)
-
- except Exception as error:
- pass
-
- def main():
-
- while True:
- filename = get_dpkt()
- with open(filename, "rb") as f:
- pcap = dpkt.pcap.Reader(f)
- print_pcap(pcap)
-
- os.remove(filename)
-
- if __name__ =='__main__':
- main()
实现输出:
- IP: 192.168.8.4(本机) -> 101.226.211.223 (len=770 ttl=128 DF=1 MF=0 offset=0)
- URL: client.show.qq.com/cgi-bin/qqshow_user_props_info
- METHOD: POST
- Headers:
- accept: */*
- accept-language: zh-CN
- x-flash-version: 32,0,0,330
- content-type: application/x-www-form-urlencoded
- content-length: 115
- accept-encoding: gzip, deflate
- user-agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E)
- host: client.show.qq.com
- connection: Keep-Alive
- cache-control: no-cache
- cookie: pgv_pvid=3799000690; euin_cookie=640439D46CDC58665AB4F5F3B323373956EAFBBF9BF51FDF; ptcz=5d07117027510d320908125b0ef4126ddda91a6d014acaf2f052391f96270a23; pgv_pvi=2758768640; uin_cookie=207223216; RK=3QRly54pcL
- Body:
- senduin: 24350438
- uin: 20722321
- sVersion: 2014
- ckey: B2A96E6CCA568A891AA2FEFF214DC03A73FC7D583079467F01117641FAD33BA9
- Data: