-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathesp8266_decoder.py
221 lines (195 loc) · 5.61 KB
/
esp8266_decoder.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
import os,signal
import commands
import string
import time
from subprocess import Popen, PIPE
#commands.getstatus('airmon-ng stop mon0')
#commands.getstatus('airmon-ng start wlan0')
#list existing Aps and find their channels
#os.system('iwconfig
# You need to shutdown wlan0 first, unless you can not change the channel of mon0
#commands.getstatus('ifconfig wlan0 down')
wifi_channel = 11
#commands.getstatus("iwconfig mon0 channel %d" %wifi_channel)
#os.system('tcpdump -i mon0 -t -q -c 4 udp portrange 0-8000 and net 234')
#output = commands.getoutput('tcpdump -i mon0 -t -q -c 16 udp portrange 0-8000 and net 234')
#lines = output.split("\n")
#for line in lines:
p = Popen("tcpdump -i mon0 -nONtqe -s0 udp portrange 0-65500 and net 234", shell=True, stdout=PIPE)
ippre = []
ipcount = 0
length_list = []
for line in p.stdout:
if line.find("length") == -1:
continue
print line
important_msg = line.splitlines()[0].split(">")[1].lstrip()
print important_msg[1]
iplen = important_msg.split(" ")
ip = iplen[0].split(".")[0:4]
length = iplen[-1]
if ipcount != 0:
if ippre == ip:
ipcount = ipcount + 1
length_list.append(length)
else:
ipcount = 0
length_list = []
else:
ippre = ip
ipcount = ipcount + 1
length_list.append(length)
if ipcount == 4 and length_list==['515','514','513','512']:
print "Received Guide Code and Exit"
break
print length
print ip
def crc8():
crcTable = []
for value in range(256):
remainder = value
for bit in range(8):
if (remainder&0x01)!=0:
remainder = (remainder>>1)^0x8c
else:
remainder = remainder>>1
crcTable.append(remainder)
return crcTable
#@param [data, index]
def crc8_update(param, crcTable):
value = 0x00 #init value
data = param[0]^value
value = (crcTable[data&0xff]^(value<<8))&0xff
data = param[1]^value
value = (crcTable[data&0xff]^(value<<8))&0xff
return value
crc_table = crc8()
def decoder_step1(param):
print param
data = param - 40
out = data>>8
if out==0:
crc_value = (data&0x00f0)>>4
print "crc_value: ", crc_value
data_value = data&0x000f
print "data_value: ", data_value
return [out, crc_value, data_value]
else:
print "index: ", data&0x00ff
return [out, data&0x00ff]
def crc8_check(param):
print param
#combine data
if len(param[0])!=3 or len(param[2])!=3:
return -1
crc_value = (param[0][1]<<4) + param[2][1]
data_value = (param[0][2]<<4) + param[2][2]
crc_value_data = crc8_update([data_value,param[1][1]], crc_table)
if crc_value == crc_value_data:
print "crc_value: %x data_value: %x crc_value_data: %x" %(crc_value, data_value, crc_value_data)
print "crc succeed"
return 1
else:
return -1
#@data_byte divide into 3 16bit:
# 1st 16bit, 0x00 crc_high, data_high,
# 2st 16bit, 0x01 index,
# 3st 16bit, 0x00 crc_low, data_low,
data_byte = []
#data_seq = #here 100 may be a potential bug
data_seq = {} #dict
data_received = False
ApPasswd = ""
ApSsid = ""
ApEnc = ""
ApAuth = ""
ApBSsid = []
SourceIp = []
def getApBSsid(param):
print param
data_line = param
data_line = param[param.find("BSSID:") + 6:]
data_line = data_line[:(data_line.find(" "))]
data_line = data_line.upper()
return data_line
def getApSsidEncAuth(bssid, channel):
enc_list = ['OPN', 'WPA', 'WPA2', 'WEP']
auth_list = ['psk']
result = -1
ap_enc = []
ap_auth = []
ap_ssid = []
handle = Popen("airodump-ng mon0 --bssid %s --channel %d" %(bssid, channel), shell=True, stdout=PIPE, stderr=PIPE)
for ln in handle.stderr:
print bssid
print ln
if ln.find(bssid) != -1:
result = ln.rstrip().split(" ")
ap_ssid = result[-1]
for vl in result:
if ap_enc == []:
for enc in enc_list:
if vl == enc:
ap_enc = enc
continue
if ap_auth == []:
for auth in auth_list:
if vl == auth:
ap_auth = enc
break
return ap_ssid, ap_enc, ap_auth
# head_data are the first 9 bytes of the DATA
head_data_ready = False
for line in p.stdout:
if line.find("length") == -1:
continue
if ApBSsid == []:
ApBSsid = getApBSsid(line)
ApSsid, ApEnc, ApAuth = getApSsidEncAuth(ApBSsid, wifi_channel)
important_msg = line.splitlines()[0].split(">")[1].lstrip()
#print important_msg[1]
iplen = important_msg.split(" ")
ip = iplen[0].split(".")[0:4]
#if ip!=ippre:
# continue
length = iplen[-1]
de_value = decoder_step1(string.atoi(length, 10))
data_byte.append(de_value)
if len(data_byte) == 3:
index_pattern = [data_byte[0][0], data_byte[1][0], data_byte[2][0]]
if index_pattern==[0,1,0]:
print data_byte
if crc8_check(data_byte) == 1:
if data_seq.has_key(data_byte[1][1])!=True:
data_seq[data_byte[1][1]] = (data_byte[0][2]<<4) + data_byte[2][2]
data_byte = []
else:
data_byte = data_byte[1:]
for i in range(9):
if data_seq.has_key(i)==False:
break
if i == 8:
head_data_ready = True
if head_data_ready==False:
continue
SourceIp = "%d:%d:%d:%d" %(data_seq.get(5),data_seq.get(6),data_seq.get(7),data_seq.get(8))
if ApBSsid != []:
if data_seq.get(1)>0:
for i in range(data_seq.get(1)):
if data_seq.has_key(i+9)==False:
break
ApPasswd += chr(data_seq.get(i+9))
if i == (data_seq.get(1) - 1):
data_received = True
if data_received == False:
ApPasswd = []
else:
ApPasswd = []
print "Empty password"
print "ApBSsid %s, ApSsid %s, ApEnc %s, ApAuth %s, SourceIp %s, ApPasswd %s" %(ApBSsid, ApSsid, ApEnc, ApAuth, SourceIp, ApPasswd)
if data_received == True:
break
print length, ip
#data we need: #ApSsid, ApBSsid, ApPasswd, ApEncription, ApAuthentication, SourceIP, SourcePort
#os.killpg(p.pid,signal.SIGKILL)
#os.waitpid(p.pid, 0)