123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600 |
- #include <stdio.h>
- #include <pcap.h>
- #include <stdlib.h>
- #include <stdint.h>
- #include <string.h>
- #include "experiment4.h"
- //Copied from wireshark. Will be overwritten by firmware
- u_char radioTapHeader[36] = "\x00\x00\x24\x00\x2f\x40\x00\xa0\x20\x08\x00\x00\x00\x00\x00\x00" \
- "\x9d\x5c\xa0\x15\x01\x00\x00\x00\x10\x02\x6c\x09\xa0\x00\xa7\x00" \
- "\x00\x00\xa7\x00";
- //Mac address of Atheros Wi-Fi dongle
- //Dongle will only ACK frames to its own MAC address
- u_char myMAC[6] = "\x00\x0a\xeb\x2d\x72\x55";
- //Mac address of SUT, needed to ignore frames from other devices
- u_char sutMAC[6] = "\xcc\xfa\x00\xc9\xfc\xad"; //LG Optimus G
- //Returns filter for libpcap
- //we want to use as many filters here as possible, since libpcap is closer to the hardware than this user-level program
- //we only want to receive Probe requests, Authentication frames and Association requests, all to only our own MAC address or broadcast address
- //furthermore, all frames except ACK frames (which have no source address) should be sent from the SUT MAC address
- //also, it is important not to compile and set the filter between each pcap_next. Otherwise ACK frames will be missed
- const char *getFilterString()
- {
- //xx:xx:xx:xx:xx:xx will become myMAC, yy:yy:yy:yy:yy:yy will become sutMAC
- static char filterString[] = "(wlan subtype probe-req and (wlan addr1 xx:xx:xx:xx:xx:xx or wlan addr1 ff:ff:ff:ff:ff:ff) and wlan addr2 yy:yy:yy:yy:yy:yy)" \
- " or ( wlan addr1 xx:xx:xx:xx:xx:xx and wlan addr2 yy:yy:yy:yy:yy:yy and ( wlan subtype auth or wlan subtype assoc-req))" \
- " or ( wlan addr1 xx:xx:xx:xx:xx:xx and wlan subtype ack)";
- //convert myMAC and sutMAC to strings
- char myMacStr[18];
- char sutMacStr[18];
- snprintf(myMacStr, sizeof(myMacStr), "%02x:%02x:%02x:%02x:%02x:%02x",
- myMAC[0], myMAC[1], myMAC[2], myMAC[3], myMAC[4], myMAC[5]);
- snprintf(sutMacStr, sizeof(sutMacStr), "%02x:%02x:%02x:%02x:%02x:%02x",
- sutMAC[0], sutMAC[1], sutMAC[2], sutMAC[3], sutMAC[4], sutMAC[5]);
- //replace placeholder MACs in filterString with correct MACstring (hardcoded positions!)
- strncpy(filterString+40, myMacStr,17);
- strncpy(filterString+106, sutMacStr,17);
- strncpy(filterString+141, myMacStr,17);
- strncpy(filterString+174, sutMacStr,17);
- strncpy(filterString+260, myMacStr,17);
- return filterString;
- }
- //Returns source address pointer location in packet
- u_char *getSourceAddrOfPacket(const u_char *packet)
- {
- //get header length
- u_char headerLength;
- headerLength = packet[2];
- //calculate offset to address
- const u_char *addr;
- int offset = headerLength;
- offset = offset + 10;
- //get pointer to address
- addr = packet + offset;
- return (u_char*) addr;
- }
- //Returns Version, Type and Subtype (one byte)
- u_char getFrameTypeOfPacket(const u_char *packet)
- {
- //get header length
- u_char headerLength;
- headerLength = packet[2];
- //calculate offset to frame type
- const u_char *frameType;
- int offset = headerLength;
- offset = offset + 0;
- //get pointer to frameType
- frameType = packet + offset;
- return *frameType;
- }
- //Sends packet using pcap. Returns status
- int sendPacket(pcap_t *pcap_h, u_char *packet, int size)
- {
- int sendStatus = pcap_sendpacket(pcap_h, packet, size);
- //when frame failed to send
- if (sendStatus == 1)
- {
- printf("Failed to send frame:\n");
- //print failed frame
- int printCounter = 0;
- for(int i = 0; i < size; i++)
- {
- printf("%02X ", packet[i]);
- printCounter = printCounter + 1;
- if (printCounter == 16)
- {
- printCounter = 0;
- printf("\n");
- }
- }
- printf("\n");
- }
-
- return sendStatus;
- }
- //Creates Authentication frame and sends it
- int sendAuthResponse(pcap_t *pcap_h, u_char *dstAddress)
- {
- //fill in struct
- authResponse authResp = {
- 36, radioTapHeader, //RadioTap hdr (overwritten by firmware)
- 1, "\xb0", //Type
- 1, "\x00", //Subtype
- 2, "\x3a\x01", //Duration
- 6, dstAddress, //DST addr
- 6, myMAC, //Source addr
- 6, myMAC, //BSS addr
- 2, "\x00\x00", //Seq nr (overwritten by firmware)
- 2, "\x00\x00", //Auth alg
- 2, "\x02\x00", //Auth seq
- 2, "\x00\x00", //Status code
- 4, "\x00\x00\x00\x00" //FSC (overwritten by firmware)
- };
- //calculate size of final packet
- int packetSize = authResp.len_radioTapHdr
- + authResp.len_type
- + authResp.len_flags
- + authResp.len_duration
- + authResp.len_destAddr
- + authResp.len_sourceAddr
- + authResp.len_bssAddr
- + authResp.len_seqNr
- + authResp.len_authAlg
- + authResp.len_authSeq
- + authResp.len_status
- + authResp.len_fsc;
- //define packet
- u_char authRespPacket[packetSize];
- //copy all struct fields into packet
- int copyOffset = 0;
- memcpy(authRespPacket + copyOffset, authResp.radioTapHdr, authResp.len_radioTapHdr);
- copyOffset = copyOffset + authResp.len_radioTapHdr;
- memcpy(authRespPacket + copyOffset, authResp.type, authResp.len_type);
- copyOffset = copyOffset + authResp.len_type;
- memcpy(authRespPacket + copyOffset, authResp.flags, authResp.len_flags);
- copyOffset = copyOffset + authResp.len_flags;
- memcpy(authRespPacket + copyOffset, authResp.duration, authResp.len_duration);
- copyOffset = copyOffset + authResp.len_duration;
- memcpy(authRespPacket + copyOffset, authResp.destAddr, authResp.len_destAddr);
- copyOffset = copyOffset + authResp.len_destAddr;
- memcpy(authRespPacket + copyOffset, authResp.sourceAddr, authResp.len_sourceAddr);
- copyOffset = copyOffset + authResp.len_sourceAddr;
- memcpy(authRespPacket + copyOffset, authResp.bssAddr, authResp.len_bssAddr);
- copyOffset = copyOffset + authResp.len_bssAddr;
- memcpy(authRespPacket + copyOffset, authResp.seqNr, authResp.len_seqNr);
- copyOffset = copyOffset + authResp.len_seqNr;
- memcpy(authRespPacket + copyOffset, authResp.authAlg, authResp.len_authAlg);
- copyOffset = copyOffset + authResp.len_authAlg;
- memcpy(authRespPacket + copyOffset, authResp.authSeq, authResp.len_authSeq);
- copyOffset = copyOffset + authResp.len_authSeq;
- memcpy(authRespPacket + copyOffset, authResp.status, authResp.len_status);
- copyOffset = copyOffset + authResp.len_status;
- memcpy(authRespPacket + copyOffset, authResp.fsc, authResp.len_fsc);
- copyOffset = copyOffset + authResp.len_fsc;
- //send packet
- return sendPacket(pcap_h, authRespPacket, packetSize);
- }
- //Creates Association response frame and sends it
- int sendAssResponse(pcap_t *pcap_h, u_char *dstAddress)
- {
- #define numberOfAssInfoElems (1) //number of information elements
- //definition of all information elements
- infoElem suppRates = {
- 1, //id
- 8, //len
- 8, //real lenght of data
- "\x82\x84\x8b\x96\x0c\x12\x18\x24" //data
- };
- //create array of information elements
- infoElem taggedParams[numberOfAssInfoElems] = {suppRates};
- //length of all info elements, including id and len field
- int len_taggedParams = 0;
- for(int i = 0; i < numberOfAssInfoElems; i++)
- {
- //+2 to include id and len field size
- len_taggedParams = len_taggedParams + taggedParams[i].len_data+2;
- }
- //fill in struct
- assResponse assResp = {
- 36, radioTapHeader, //RadioTap hdr (overwritten by firmware)
- 1, "\x10", //Type
- 1, "\x00", //Flags
- 2, "\x40\x01", //Duration
- 6, dstAddress, //DST addr
- 6, myMAC, //Source addr
- 6, myMAC, //BSS addr
- 2, "\x00\x00", //Seq nr (overwritten by firmware)
- 2, "\x01\x00", //Capab info
- 2, "\x00\x00", //Status code
- 2, "\x01\xc0", //Association id
-
- len_taggedParams,
- taggedParams, //Information elements
- 4, "\x00\x00\x00\x00" //FSC (overwritten by firmware)
- };
- //calculate size of final packet
- int packetSize = assResp.len_radioTapHdr
- + assResp.len_type
- + assResp.len_flags
- + assResp.len_duration
- + assResp.len_destAddr
- + assResp.len_sourceAddr
- + assResp.len_bssAddr
- + assResp.len_seqNr
- + assResp.len_capabInfo
- + assResp.len_status
- + assResp.len_assId
- + assResp.len_taggedParams
- + assResp.len_fsc;
- //define packet
- u_char assRespPacket[packetSize];
- //copy all struct fields into packet
- int copyOffset = 0;
- memcpy(assRespPacket + copyOffset, assResp.radioTapHdr, assResp.len_radioTapHdr);
- copyOffset = copyOffset + assResp.len_radioTapHdr;
- memcpy(assRespPacket + copyOffset, assResp.type, assResp.len_type);
- copyOffset = copyOffset + assResp.len_type;
- memcpy(assRespPacket + copyOffset, assResp.flags, assResp.len_flags);
- copyOffset = copyOffset + assResp.len_flags;
- memcpy(assRespPacket + copyOffset, assResp.duration, assResp.len_duration);
- copyOffset = copyOffset + assResp.len_duration;
- memcpy(assRespPacket + copyOffset, assResp.destAddr, assResp.len_destAddr);
- copyOffset = copyOffset + assResp.len_destAddr;
- memcpy(assRespPacket + copyOffset, assResp.sourceAddr, assResp.len_sourceAddr);
- copyOffset = copyOffset + assResp.len_sourceAddr;
- memcpy(assRespPacket + copyOffset, assResp.bssAddr, assResp.len_bssAddr);
- copyOffset = copyOffset + assResp.len_bssAddr;
- memcpy(assRespPacket + copyOffset, assResp.seqNr, assResp.len_seqNr);
- copyOffset = copyOffset + assResp.len_seqNr;
- memcpy(assRespPacket + copyOffset, assResp.capabInfo, assResp.len_capabInfo);
- copyOffset = copyOffset + assResp.len_capabInfo;
- memcpy(assRespPacket + copyOffset, assResp.status, assResp.len_status);
- copyOffset = copyOffset + assResp.len_status;
- memcpy(assRespPacket + copyOffset, assResp.assId, assResp.len_assId);
- copyOffset = copyOffset + assResp.len_assId;
- //copy all information elements
- for(int i = 0; i < numberOfAssInfoElems; i++)
- {
- memcpy(assRespPacket + copyOffset, &taggedParams[i].id, 1);
- copyOffset = copyOffset + 1;
- memcpy(assRespPacket + copyOffset, &taggedParams[i].len, 1);
- copyOffset = copyOffset + 1;
- memcpy(assRespPacket + copyOffset, taggedParams[i].data, taggedParams[i].len_data);
- copyOffset = copyOffset + taggedParams[i].len_data;
- }
-
- memcpy(assRespPacket + copyOffset, assResp.fsc, assResp.len_fsc);
- copyOffset = copyOffset + assResp.len_fsc;
- //send packet
- return sendPacket(pcap_h, assRespPacket, packetSize);
- }
- //Creates Probe response frame and sends it
- int sendProbeResponse(pcap_t *pcap_h, u_char *dstAddress)
- {
- #define numberOfProbeInfoElems (3) //number of information elements
- //definition of all information elements
- infoElem ssid = {
- 0, //id
- 6, //len
- 6, //real length of data
- "\x46\x75\x7a\x7a\x41\x50" //data
- };
- infoElem suppRates = {
- 1, //id
- 7, //len
- 7, //real length of data
- "\x96\x18\x24\x30\x48\x60\x6c" //data
- };
- infoElem dsParam = {
- 3, //id
- 1, //len
- 1, //real length of data
- "\x01" //data
- };
- //create array of information elements
- infoElem taggedParams[numberOfProbeInfoElems] = {ssid, suppRates, dsParam};
- //length of all info elements, including id and len field
- int len_taggedParams = 0;
- for(int i = 0; i < numberOfProbeInfoElems; i++)
- {
- //+2 to include id and len field size
- len_taggedParams = len_taggedParams + taggedParams[i].len_data+2;
- }
- //fill in struct
- probeResponse probeResp = {
- 36, radioTapHeader, //RadioTap hdr (overwritten by firmware)
- 1, "\x50", //Type
- 1, "\x00", //Flags
- 2, "\x3a\x01", //Duration
- 6, dstAddress, //DST addr
- 6, myMAC, //Source addr
- 6, myMAC, //BSS addr
- 2, "\x00\x00", //Seq nr (overwritten by firmware)
- 8, "\x00\x00\x00\x00\x00\x00\x00\x00", //Timestamp (overwritten by firmware)
- 2, "\x64\x00", //Beacon interval
- 2, "\x01\x00", //Capab info
-
- len_taggedParams,
- taggedParams, //Information elements
- 4, "\x00\x00\x00\x00" //FSC (overwritten by firmware)
- };
- //calculate size of final packet
- int packetSize = probeResp.len_radioTapHdr
- + probeResp.len_type
- + probeResp.len_flags
- + probeResp.len_duration
- + probeResp.len_destAddr
- + probeResp.len_sourceAddr
- + probeResp.len_bssAddr
- + probeResp.len_seqNr
- + probeResp.len_timeStamp
- + probeResp.len_beaconInterval
- + probeResp.len_capabInfo
- + probeResp.len_taggedParams
- + probeResp.len_fsc;
-
- //define packet
- u_char probeRespPacket[packetSize];
- //copy all struct fields into packet
- int copyOffset = 0;
- memcpy(probeRespPacket + copyOffset, probeResp.radioTapHdr, probeResp.len_radioTapHdr);
- copyOffset = copyOffset + probeResp.len_radioTapHdr;
- memcpy(probeRespPacket + copyOffset, probeResp.type, probeResp.len_type);
- copyOffset = copyOffset + probeResp.len_type;
- memcpy(probeRespPacket + copyOffset, probeResp.flags, probeResp.len_flags);
- copyOffset = copyOffset + probeResp.len_flags;
- memcpy(probeRespPacket + copyOffset, probeResp.duration, probeResp.len_duration);
- copyOffset = copyOffset + probeResp.len_duration;
- memcpy(probeRespPacket + copyOffset, probeResp.destAddr, probeResp.len_destAddr);
- copyOffset = copyOffset + probeResp.len_destAddr;
- memcpy(probeRespPacket + copyOffset, probeResp.sourceAddr, probeResp.len_sourceAddr);
- copyOffset = copyOffset + probeResp.len_sourceAddr;
- memcpy(probeRespPacket + copyOffset, probeResp.bssAddr, probeResp.len_bssAddr);
- copyOffset = copyOffset + probeResp.len_bssAddr;
- memcpy(probeRespPacket + copyOffset, probeResp.seqNr, probeResp.len_seqNr);
- copyOffset = copyOffset + probeResp.len_seqNr;
- memcpy(probeRespPacket + copyOffset, probeResp.timeStamp, probeResp.len_timeStamp);
- copyOffset = copyOffset + probeResp.len_timeStamp;
- memcpy(probeRespPacket + copyOffset, probeResp.beaconInterval, probeResp.len_beaconInterval);
- copyOffset = copyOffset + probeResp.len_beaconInterval;
- memcpy(probeRespPacket + copyOffset, probeResp.capabInfo, probeResp.len_capabInfo);
- copyOffset = copyOffset + probeResp.len_capabInfo;
- //copy all information elements
- for(int i = 0; i < numberOfProbeInfoElems; i++)
- {
- memcpy(probeRespPacket + copyOffset, &taggedParams[i].id, 1);
- copyOffset = copyOffset + 1;
- memcpy(probeRespPacket + copyOffset, &taggedParams[i].len, 1);
- copyOffset = copyOffset + 1;
- memcpy(probeRespPacket + copyOffset, taggedParams[i].data, taggedParams[i].len_data);
- copyOffset = copyOffset + taggedParams[i].len_data;
- }
-
- memcpy(probeRespPacket + copyOffset, probeResp.fsc, probeResp.len_fsc);
- copyOffset = copyOffset + probeResp.len_fsc;
- //send packet
- return sendPacket(pcap_h, probeRespPacket, packetSize);
- }
- int main(int argc, char *argv[])
- {
- pcap_t *pcap_h;
- struct bpf_program fp;
- struct pcap_pkthdr header;
- char *dev;
- char errbuf[PCAP_ERRBUF_SIZE];
- //check argument number
- if(argc != 2)
- {
- printf("Usage: %s device\n", argv[0]);
- exit(EXIT_FAILURE);
- }
- dev = argv[1];
- //initialize libpcap
- if((pcap_h = pcap_create(dev, errbuf)) == NULL)
- {
- printf("pcap_create() failed: %s\n", errbuf);
- exit(EXIT_FAILURE);
- }
- if(pcap_can_set_rfmon(pcap_h) == 0)
- {
- printf("Monitor mode can not be set.\n");
- exit(EXIT_FAILURE);
- }
- if(pcap_set_rfmon(pcap_h, 1) != 0)
- {
- printf("Failed to set monitor mode.\n");
- exit(EXIT_FAILURE);
- }
- if(pcap_activate(pcap_h) != 0)
- {
- printf("pcap_activate() failed\n");
- exit(EXIT_FAILURE);
- }
- //compile filter for incoming packets
- if(pcap_compile(pcap_h, &fp, getFilterString() , 0, PCAP_NETMASK_UNKNOWN) == -1)
- {
- printf("failed pcap_compile() with error: %s\n", pcap_geterr(pcap_h));
- exit(EXIT_FAILURE);
- }
- //apply filter
- if(pcap_setfilter(pcap_h, &fp) == -1)
- {
- printf("failed pcap_setfilter() with error: %s\n", pcap_geterr(pcap_h));
- exit(EXIT_FAILURE);
- }
- //free memory allocated by pcap_compile()
- pcap_freecode(&fp);
- //flag to indicate if we have to listen for ACK verification
- int waitForACK = 0;
- //infinite listen-respond loop
- while (1)
- {
- //receive packet
- const u_char *packet = pcap_next(pcap_h, &header);
- u_char frameType = getFrameTypeOfPacket(packet);
- u_char* sourceAddr;
- if (frameType != 0xd4) //ACK frames have no source address
- sourceAddr = getSourceAddrOfPacket(packet);
- //if we had to wait for an ACK, verify if current frame is an ACK
- if (waitForACK != 0)
- {
- if (frameType == 0xd4)
- {
- switch (waitForACK)
- {
- case 1:
- {
- printf("Association response ACKed\n");
- break;
- }
- case 2:
- {
- printf("Authentication frame ACKed\n");
- break;
- }
- case 3:
- {
- printf("Probe response ACKed\n");
- break;
- }
- default:
- {
- printf("Frame ACKed\n");
- break;
- }
- }
-
- }
- else
- {
- printf("Not sure if frame was ACKed\n");
- }
- waitForACK = 0;
- }
- else //Process frame depending on type
- {
- switch(frameType)
- {
- case 0x40:
- {
- sendProbeResponse(pcap_h, sourceAddr);
- //do not wait for ACKs of probe response, because we focus on
- //the authentication and association process
- //waitForACK = 3;
- break;
- }
- case 0xb0:
- {
- sendAuthResponse(pcap_h, sourceAddr);
- waitForACK = 2;
- break;
- }
- case 0x00:
- {
- sendAssResponse(pcap_h, sourceAddr);
- waitForACK = 1;
- break;
- }
- case 0xd4:
- {
- break;
- }
- default: break;
- }
- }
-
- }
- return 0;
- }
|