1#!/usr/local/bin/python2.7 2# send 2 non-overlapping ping fragments 3 4import os 5import threading 6from addr import * 7from scapy.all import * 8 9class Sniff1(threading.Thread): 10 filter = None 11 captured = None 12 packet = None 13 def run(self): 14 self.captured = sniff(iface=SRC_IF, filter=self.filter, 15 count=1, timeout=3) 16 if self.captured: 17 self.packet = self.captured[0] 18 19dstaddr=sys.argv[1] 20pid=os.getpid() 21eid=pid & 0xffff 22payload="ABCDEFGHIJKLOMNO" 23packet=IP(src=SRC_OUT, dst=dstaddr)/ICMP(type='echo-request', id=eid)/payload 24fid=pid & 0xffff 25frag0=str(packet)[20:36] 26frag1=str(packet)[36:44] 27pkt0=IP(src=SRC_OUT, dst=dstaddr, proto=1, id=fid, frag=0, flags='MF')/frag0 28pkt1=IP(src=SRC_OUT, dst=dstaddr, proto=1, id=fid, frag=2)/frag1 29eth=[] 30eth.append(Ether(src=SRC_MAC, dst=PF_MAC)/pkt0) 31eth.append(Ether(src=SRC_MAC, dst=PF_MAC)/pkt1) 32 33sniffer = Sniff1(); 34sniffer.filter = "ip and src %s and dst %s and icmp" % (dstaddr, SRC_OUT) 35sniffer.start() 36time.sleep(1) 37sendp(eth, iface=SRC_IF) 38sniffer.join(timeout=5) 39a = sniffer.packet 40 41if a and a.type == ETH_P_IP and \ 42 a.payload.proto == 1 and \ 43 a.payload.frag == 0 and a.payload.flags == 0 and \ 44 icmptypes[a.payload.payload.type] == 'echo-reply': 45 id=a.payload.payload.id 46 print "id=%#x" % (id) 47 if id != eid: 48 print "WRONG ECHO REPLY ID" 49 exit(2) 50 load=a.payload.payload.payload.load 51 print "payload=%s" % (load) 52 if load == payload: 53 exit(0) 54 print "PAYLOAD!=%s" % (payload) 55 exit(1) 56print "NO ECHO REPLY" 57exit(2) 58