Browse Source

Extended and improved torture.py

pull/1/head
Maximilian Münchow 8 years ago
parent
commit
946ef22858
  1. 187
      test/torture.py

187
test/torture.py

@ -1,46 +1,141 @@
from socket import socket, getaddrinfo, IPPROTO_UDP """
import argparse Generates as fast as possible COMMAND_GET_COOKIE packets to see how well
from select import select the TeamSpeak 3 Server can withstand a simple DOS attack.
parser = argparse.ArgumentParser(description='Tests if the ts3init module, can withstand heavy loads.')
parser.add_argument('host', help='target host') It has two modes:
parser.add_argument('-p', dest='port', type=int, default=9987, help='target port') * a testing mode that checks that the server continues to reply with correct
parser.add_argument('-n', dest='number_of_packets', type=int, default=100000, help='number of packets to send') messages, even when under heavy load.
args = parser.parse_args() * a spoofing mode, where answers are not expected or waited for, but the source
ip and port are spoofed, in order to trick simple filtering.
target = getaddrinfo(args.host, args.port, 0, 0, IPPROTO_UDP)[0] """
print("-" * 40) from socket import socket, getaddrinfo, IPPROTO_UDP, AF_INET, SOCK_RAW, IPPROTO_RAW, inet_aton
print("Test: ts3init_reset") from argparse import ArgumentParser
print("Target: %s:%i" % target[4]) from select import select
print("-" * 40) from random import randint
print("\n") from itertools import repeat
from struct import pack, unpack_from
print("Sending %i packets..." % args.number_of_packets) from time import time
from sys import version_info, exit
sock = socket(*target[0:3])
if version_info < (3,0):
send = 0 print('python3 required.')
sendErrors = 0 exit(1)
recieved = 0
invalid = 0 parser = ArgumentParser(description='Tests if the ts3init module, can withstand heavy loads.')
try: parser.add_argument('host', help='target host')
sock.connect(target[4]) parser.add_argument('--port', type=int, default=9987, help='target port')
sock.setblocking(False) parser.add_argument('--count', type=int, default=100000, help='number of packets to send')
finished_writing = False parser.add_argument('--response', type=int, default=1, help='what command number is expected to be returned from the server')
while True: parser.add_argument('--spoof', action='store_const', const=True, default=False, help='should the source address be spoofed')
(canRead, canWrite, _) = select([sock.fileno()], [sock.fileno()] if send < args.number_of_packets else [] , [], 1) parser.add_argument('--version', type=int, default=1459504131, help='version number send to the server')
if canRead: args = parser.parse_args()
data = sock.recv(128)
if not data == b'TS3INIT1\x65\x00\x88\x05\x00': def generateSpoofedHeader(dest_address, dest_port, payload):
invalid += 1 # checksum functions needed for calculation checksum
recieved += 1 def checksum(msg):
if canWrite: s = 0
try: for i in range(0, len(msg), 2):
sock.send(str(send).encode()) w = msg[i+1] + (msg[i] << 8)
send += 1 s = s + w
except: s = (s>>16) + (s & 0xffff);
sendErrors += 1 s = s + (s >> 16);
if not canRead and not canWrite: s = ~s & 0xffff
break return s
finally:
sock.close() source_address = randint(0, (1 << 32) - 1)
print("send: %i(errors: %i); recieved: %i; invalid: %i" % (send, sendErrors, recieved, invalid)) source_port = randint(0, (1 << 16) - 1)
udp_length = 8 + len(payload)
udp_checksum = checksum(pack('!I4sxBHHHH2x',
source_address , dest_address, IPPROTO_UDP, udp_length,
source_port, dest_port, udp_length) + payload)
if udp_checksum == 0:
udp_checksum = (1 << 16) - 1
return pack('!BBHHHBBHI4sHHHH',
(4 << 4) + 5, # Version, IHL
0, # TOS
0, # Total Length, kernel will fill the correct total length
0, # Identification
0, # Fragment Offset
255, # TTL
IPPROTO_UDP, # Protocol
0, # Header checksum, kernel will fill the correct checksum
source_address, # Source Address
dest_address, # Destination Address
source_port, # Source Port
dest_port, # Destination Port
udp_length, # UDP Length
udp_checksum); # UDP Checksum
def generatePayload(version):
number = randint(0, (1 << 32) - 1)
return pack('!8sHHBIBII8x',
b'TS3INIT1', # Literal
101, # Packet ID
0, # Client ID
0x88, # Flags,
version, # Version
0, # Command
int(time()), # Timestamp
number); # Random-Sequence
def validateResponse(answer, expectedCommand):
(literal, packet_id, flags, command) = unpack_from('!8sHBB', answer)
return (literal == 'TS3INIT1'
and packet_id == 101
and flags == 0x88
and command == expectedCommand)
target = getaddrinfo(args.host, args.port, 0, 0, IPPROTO_UDP)[0]
print("Sending %i packets to %s:%i..." % (args.count, *target[4]))
if not args.spoof:
send = 0
sendErrors = 0
recieved = 0
invalid = 0
sock = socket(*target[0:3])
try:
sock.connect(target[4])
sock.setblocking(False)
finished_writing = False
while True:
(canRead, canWrite, _) = select([sock.fileno()], [sock.fileno()] if not args.spoof and send < args.count else [] , [], 1)
if canRead:
data = sock.recv(128)
if not validateResponse(data, args.response):
invalid += 1
recieved += 1
if canWrite:
try:
packet = generatePayload(args.version)
sock.send(packet)
send += 1
except:
sendErrors += 1
if not canRead and not canWrite:
break
finally:
sock.close()
print("send: %i(errors: %i); recieved: %i; invalid: %i" % (send, sendErrors, recieved, invalid))
else:
send = 0
sendErrors = 0
sock = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)
try:
dest_address = inet_aton(target[4][0])
dest_port = target[4][1]
for _ in repeat(None, args.count):
try:
payload = generatePayload(args.version)
packet = generateSpoofedHeader(dest_address, dest_port, payload) + payload
select([sock.fileno()], [] , [], 0)
sock.sendto(packet, target[4])
send += 1
except BaseException as e:
print(e)
sendErrors += 1
finally:
sock.close()
print("send: %i(errors: %i);" % (send, sendErrors))

Loading…
Cancel
Save