func TestPackEthIPv4UDPRaw(t *testing.T) { eth_pkt := eth.Make() eth_pkt.SrcAddr, _ = net.ParseMAC(hwsrc_str) eth_pkt.DstAddr, _ = net.ParseMAC(hwdst_str) ip4_pkt := ipv4.Make() ip4_pkt.SrcAddr = net.ParseIP(ipsrc_str) ip4_pkt.DstAddr = net.ParseIP(ipdst_str) udp_pkt := udp.Make() udp_pkt.SrcPort = 41562 udp_pkt.DstPort = 8338 raw_pkt := raw.Make() raw_pkt.Data = []byte("fdg agfh ldfhgk hfdkgh kfjdhsg kshfdgk") data, err := layers.Pack(eth_pkt, ip4_pkt, udp_pkt, raw_pkt) if err != nil { t.Fatalf("Error packing: %s", err) } if ip4_pkt.GetLength() != 66 { t.Fatalf("IPv4 length mismatch: %d", ip4_pkt.GetLength()) } if udp_pkt.GetLength() != 46 { t.Fatalf("UDP length mismatch: %d", udp_pkt.GetLength()) } if !bytes.Equal(test_eth_ipv4_udp_raw, data) { t.Fatalf("Raw packet mismatch: %x", data) } }
func TestPackEthIPv4UDP(t *testing.T) { eth_pkt := eth.Make() eth_pkt.SrcAddr, _ = net.ParseMAC(hwsrc_str) eth_pkt.DstAddr, _ = net.ParseMAC(hwdst_str) ip4_pkt := ipv4.Make() ip4_pkt.SrcAddr = net.ParseIP(ipsrc_str) ip4_pkt.DstAddr = net.ParseIP(ipdst_str) udp_pkt := udp.Make() udp_pkt.SrcPort = 41562 udp_pkt.DstPort = 8338 buf, err := layers.Pack(eth_pkt, ip4_pkt, udp_pkt) if err != nil { t.Fatalf("Error packing: %s", err) } if !bytes.Equal(test_eth_ipv4_udp, buf) { t.Fatalf("Raw packet mismatch: %x", buf) } }
func main() { log.SetFlags(0) usage := `Usage: traceroute (--icmp | --udp | --tcp ) <addr> Find the route to the given IP address using ICMP, UDP or TCP packets. Options: --icmp Use ICMP packets. --udp Use UDP packets. --tcp Use TCP packets.` args, err := docopt.Parse(usage, nil, true, "", false) if err != nil { log.Fatalf("Invalid arguments: %s", err) } addr := args["<addr>"].(string) addr_ip := net.ParseIP(addr) timeout := 5 * time.Second route, err := routing.RouteTo(addr_ip) if err != nil { log.Fatalf("Error: %s", err) } if route == nil { log.Println("No route found") } c, err := pcap.Open(route.Iface.Name) if err != nil { log.Fatalf("Error opening interface: %s", err) } defer c.Close() err = c.Activate() if err != nil { log.Fatalf("Error activating source: %s", err) } eth_pkt := eth.Make() eth_pkt.SrcAddr = route.Iface.HardwareAddr if route.Default { eth_pkt.DstAddr = ResolveARP(c, timeout, route, route.Gateway) } else { eth_pkt.DstAddr = ResolveARP(c, timeout, route, addr_ip) } ipv4_pkt := ipv4.Make() ipv4_pkt.SrcAddr, _ = route.GetIfaceIPv4Addr() ipv4_pkt.DstAddr = addr_ip ipv4_pkt.Id = uint16(rand.Intn(math.MaxUint16)) ipv4_pkt.TTL = 1 var payload_pkt packet.Packet if args["--icmp"].(bool) { icmp_pkt := icmpv4.Make() icmp_pkt.Type = icmpv4.EchoRequest icmp_pkt.Id = uint16(rand.Intn(math.MaxUint16)) icmp_pkt.Seq = 1 payload_pkt = icmp_pkt } if args["--udp"].(bool) { udp_pkt := udp.Make() udp_pkt.SrcPort = 49152 udp_pkt.DstPort = 33434 raw_pkt := raw.Make() raw_pkt.Data = make([]byte, 40-udp_pkt.GetLength()) for i := 0; i < len(raw_pkt.Data); i++ { raw_pkt.Data[i] = byte(0x40 + (i & 0x3f)) } udp_pkt.SetPayload(raw_pkt) payload_pkt = udp_pkt } if args["--tcp"].(bool) { tcp_pkt := tcp.Make() tcp_pkt.SrcPort = 49152 tcp_pkt.DstPort = 80 tcp_pkt.Flags = tcp.Syn | tcp.ECE | tcp.Cwr tcp_pkt.Seq = uint32(rand.Intn(math.MaxUint32)) tcp_pkt.WindowSize = 5840 raw_pkt := raw.Make() raw_pkt.Data = make([]byte, 40-tcp_pkt.GetLength()) for i := 0; i < len(raw_pkt.Data); i++ { raw_pkt.Data[i] = byte(0x40 + (i & 0x3f)) } tcp_pkt.SetPayload(raw_pkt) payload_pkt = tcp_pkt } for { pkt, err := network.SendRecv(c, timeout, eth_pkt, ipv4_pkt, payload_pkt) if err != nil { log.Fatal(err) } ipv4_rsp := layers.FindLayer(pkt, packet.IPv4).(*ipv4.Packet) log.Println(ipv4_rsp.SrcAddr) if ipv4_rsp.SrcAddr.Equal(addr_ip) { return } ipv4_pkt.TTL++ ipv4_pkt.Id++ if ipv4_pkt.TTL > 64 { return } } }