-
Notifications
You must be signed in to change notification settings - Fork 1
/
portscan.py
348 lines (284 loc) · 10.9 KB
/
portscan.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
import socket
import argparse
import traceback
import struct
import os
import datetime
import threading
import multiprocessing
from random import randint
from tabulate import tabulate
from concurrent.futures import ThreadPoolExecutor, ProcessPoolExecutor
BUFFER_SIZE = 1024
FP = 31337
PSIZE = 100
ports = [_ for _ in range(FP, FP+PSIZE)]
used_ports = [False] * PSIZE
MESSAGE = 192 * b'Q'
UNKNOWN = 'unknow'
def get_cur_time():
diff = datetime.datetime.utcnow() - datetime.datetime(1900, 1, 1, 0, 0, 0)
return diff.days * 24 * 60 * 60 + diff.seconds
class ProtoScanner:
def __init__(self):
self.checkers = [(self.scan_if_pop3, 'pop3'), (self.scan_if_smtp, 'smtp'),
(self.scan_if_imap, 'imap'), (self.scan_if_http, 'http'),
(self.scan_if_dns, 'dns'), (self.scan_if_ntp, 'ntp')]
def get_sockets(self, timeout=2):
udp = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
tcp = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
for s in [udp, tcp]:
s.settimeout(timeout)
return [(udp, 'udp'), (tcp, 'tcp')]
def send_data(self, sock, data, udpaddr=None):
resp = b''
try:
if udpaddr:
sock.sendto(data, udpaddr)
resp, _ = sock.recvfrom(BUFFER_SIZE)
else:
sock.send(data)
resp = sock.recv(BUFFER_SIZE)
except socket.error:
pass
return resp
def scan_receivable(self, sendata, checkdata, sock, udpaddr):
resp = self.send_data(sock, sendata, udpaddr)
for cdata in checkdata:
if cdata in resp:
return True
return False
def check_if_correct(self, resp):
return resp not in [None, b''] and resp[-5:] != b'\x00' * 5
def scan_if_smtp(self, sock, udpaddr=None):
return self.scan_receivable(b'EHLO a', [b'smtp', b'SMTP'], sock, udpaddr)
def scan_if_ntp(self, sock, udpaddr=None):
ntp_request = b'\xe3\x00\x03\xfa' + b'\x00\x01\x00\x00' * 2 + 28 * b'\x00'
ntp_request += struct.pack('!I ', get_cur_time()) + b'\x00' * 4
resp = self.send_data(sock, ntp_request, udpaddr)
return self.check_if_correct(resp)
def scan_if_dns(self, sock, udpaddr=None):
google = b'\x06\x67\x6f\x6f\x67\x6c\x65\x03\x63\x6f\x6d\x00'
dns_query = (b'\xb9\x73\x01\x00\x00\x01\x00\x00\x00\x00\x00\x00'
b'\x03\x77\x77\x77') + google + b'\x00\x01\x00\x01'
resp = self.send_data(sock, dns_query, udpaddr)
return self.check_if_correct(resp) and google in resp
def scan_if_pop3(self, sock, udpaddr=None):
return self.scan_receivable(b'test', [b'+OK POP', b'+OK pop'], sock, udpaddr)
def scan_if_imap(self, sock, udpaddr=None):
return self.scan_receivable(b'test', [b'* OK ', b'IMAP'], sock, udpaddr)
def scan_if_http(self, sock, udpaddr=None):
return self.scan_receivable(b'ping\r\n', [b'HTTP'], sock, udpaddr)
class Scanner:
def __init__(self, host, min_port, max_port, tcp, udp):
super().__init__()
self.host = host
self.min_port = min_port
self.max_port = max_port
self.open_ports = []
self._tcp = tcp
self._udp = udp
self.proto_scan = ProtoScanner()
def _write_res(self, addr, prot, state):
port = addr[1]
checkers = self.proto_scan.checkers
service = UNKNOWN
try:
for checker, proto in checkers:
is_set = False
for sock, sock_prot in self.proto_scan.get_sockets():
if sock_prot == 'tcp':
try:
sock.connect(addr)
except socket.error:
continue
if checker(sock, None if sock_prot == 'tcp' else addr):
service = proto
is_set = True
break
if is_set:
break
# service = socket.getservbyport(port, prot)
except OSError as e:
pass
finally:
if service == UNKNOWN:
service = socket.getservbyport(int(port))
return ['{:>5}\\{}'.format(port, prot), state, service]
def _check_valid_udp_packet(self, packet, port):
src_port = struct.unpack('>H', packet[-8:-6])[0]
dst_port = struct.unpack('>H', packet[-6:-4])[0]
if port != src_port:
return None
ptype = packet[(packet[0] & 0xF) * 4]
if ptype != 3:
return True
return False
def _inner_scan_udp(self, host):
resp = []
is_reachable = False
is_set = False
send = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
recv = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.IPPROTO_ICMP)
recv.settimeout(3)
recv.bind(('', 0))
main_packet = MESSAGE
send.sendto(main_packet, host)
try:
last_packet = b''
while not is_set:
data, _ = recv.recvfrom(BUFFER_SIZE)
if not data:
break
packets = []
if MESSAGE in data:
packets = data.split(MESSAGE)[:-1]
if last_packet:
last_packet += packets[0]
elif last_packet:
last_packet += data
for packet in packets:
is_reachable = self._check_valid_udp_packet(packet, send.getsockname()[1])
if is_reachable != None:
is_set = True
except socket.error:
is_reachable = True
finally:
send.close()
return is_reachable
def _st_udp_scan(self, host):
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
sock.settimeout(3)
try:
sock.sendto(b'', host)
resp, _ = sock.recvfrom(BUFFER_SIZE)
return True
except socket.error:
return False
def scan_udp(self, host):
if not self._udp:
return []
is_reachable = False
for i in range(3):
if self._inner_scan_udp(host):
is_reachable = True
break
return self._write_res(host, 'udp', 'open') if is_reachable else []
def scan_tcp(self, host):
if not self._tcp:
return []
resp = []
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.settimeout(1)
res = sock.connect_ex(host)
if res == 0:
resp = self._write_res(host, 'tcp', 'open')
sock.close()
return resp
def scan(self):
open_ports = []
protocol_scans = [self.scan_tcp, self.scan_udp]
for i in range(self.min_port, self.max_port):
for _scan in protocol_scans:
resp = _scan((self.host, i))
if resp != []:
self.open_ports.append(resp)
return self.open_ports
class ThreadScanner(Scanner, threading.Thread):
def __init__(self, host, min_port, max_port, tcp, udp):
super(ThreadScanner, self).__init__(host, min_port, max_port, tcp, udp)
def run(self):
self.scan()
class ScanManager:
def __init__(self, tcp, udp, smooth, threads=5):
self.threads = threads
self._tcp = tcp
self._udp = udp
self._smooth = smooth
def scan(self, host, left, right):
columns = [['PORT', 'STATE', 'SERVICE']]
open_ports = []
if self._smooth:
open_ports = self.smooth_scan(host, left, right)
else:
open_ports = self.pool_scan(host, left, right)
print(tabulate(columns + open_ports))
def pool_scan(self, host, left, right):
def wait_for_workers(futures, open_ports, complete=False):
if complete:
for x in futures:
while not x.done():
pass
open_ports += x.result()
else:
while True:
new_futures = []
for x in futures:
if x.done():
open_ports += x.result()
else:
new_futures.append(x)
if len(new_futures) != futures:
futures = new_futures
return
ports_count = 5
max_workers = 5
open_ports = []
pool = ProcessPoolExecutor(max_workers)
futures = []
for port_st in range(left, right, ports_count):
if len(futures) == max_workers:
wait_for_workers(futures, open_ports)
port_fn = port_st + min(ports_count, right - port_st)
futures.append(pool.submit(Scanner(host, port_st, port_fn, self._tcp, self._udp).scan))
wait_for_workers(futures, open_ports, True)
return open_ports
def smooth_scan(self, host, left, right):
open_ports = []
scanners = []
ports_count = right - left
threads_left = self.threads
nleft = left
for _ in range(self.threads):
chunk = ports_count // threads_left
nright = nleft + chunk
if (nleft != nright):
scanners.append(ThreadScanner(host, nleft, nright, self._tcp, self._udp))
scanners[-1].start()
ports_count -= chunk
threads_left -= 1
nleft += chunk
for scanner in scanners:
scanner.min_port, scanner.max_port
scanner.join()
open_ports += scanner.open_ports
return open_ports
def main():
parser = argparse.ArgumentParser()
parser.add_argument('l', help='Lower bound of scanning ports')
parser.add_argument('r', help='Upper bound of scanning ports')
parser.add_argument('host', help='Target host for scanning')
parser.add_argument('-t', help='Number of threads')
parser.add_argument('-sT', action='store_true', help='Scan open TCP ports')
parser.add_argument('-sU', action='store_true', help='Scan open UDP ports')
parser.add_argument('--smooth', action='store_true',
help=('Use smooth scan (if this flag isn\'t specified'
' then instead will be using process pool)'))
args = parser.parse_args()
tcp, udp = args.sT, args.sU
left, right = int(args.l), int(args.r)
if tcp is False and udp is False:
tcp, udp = True, True
scan_mng = None
if args.t is not None:
scan_mng = ScanManager(tcp, udp, args.smooth, args.t)
else:
scan_mng = ScanManager(tcp, udp, args.smooth)
scan_mng.scan(args.host, left, right)
if __name__ == '__main__':
try:
main()
except PermissionError:
print('Please, use sudo.')
except KeyboardInterrupt:
print('[-] Interrupted')