Beruflich Dokumente
Kultur Dokumente
1 de 7
HOME
APPS
CODING
DISTROS
http://www.binarytides.com/packet-sniffer-code-c-linux/
GENERAL
LINUX
REVIEWS
SECURITY
SERVER
SUPER TIPS
PacketSnifferCodeinCusingsockets|Linux
C
By Silver Moon
41 Comments
Like
11
Tweet
Packet sniffers
SEARCH
Packet sniffers are programs that intercept the network traffic flowing in and out of a system through network interfaces. So
if you are browsing the internet then traffic is flowing and a packet sniffer would be able to catch it in the form of packets and
display them for whatever reasons required.
Packet sniffers are used for various needs like analysing protocols,
monitoring network, and assessing the security of a network.
Wireshark for example is the most popular packet sniffer out there
and is available for all platforms. Its gui based and very easy to use.
In this post we are going to talk about how to code and make our
own packet sniffer in C and on the linux platform. By Linux it means
that the code sample shown here would work only on linux and not
windows.
Packet sniffers can be coded by either using sockets api provided by
the kernel, or by using some packet capture library like libpcap. In this
tutorial we shall be covering the first method, that is by using sockets.
Thats all. The buffer will hold the data sniffed or picked up. The sniffing part is actually complete over here. The next task is
to actually read the captured packet, analyse it and present it to the user in a readable format.
The following code shows an example of such a sniffer. Note that it sniffs only incoming packets.
5 commands to check memory usage
on Linux
Code
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
int sock_raw;
FILE *logfile;
int tcp=0,udp=0,icmp=0,others=0,igmp=0,total=0,i,j;
struct sockaddr_in source,dest;
Binarytides
Like
int main()
{
int saddr_size , data_size;
struct sockaddr saddr;
struct in_addr in;
unsigned char *buffer = (unsigned char *)malloc(65536); //Its Big!
logfile=fopen("log.txt","w");
23/2/2015 17:58
2 de 7
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
http://www.binarytides.com/packet-sniffer-code-c-linux/
}
void ProcessPacket(unsigned char* buffer, int size)
{
//Get the IP Header part of this packet
struct iphdr *iph = (struct iphdr*)buffer;
++total;
switch (iph->protocol) //Check the Protocol and do accordingly...
{
case 1: //ICMP Protocol
++icmp;
//PrintIcmpPacket(Buffer,Size);
break;
case 2: //IGMP Protocol
++igmp;
break;
case 6: //TCP Protocol
++tcp;
print_tcp_packet(buffer , size);
break;
case 17: //UDP Protocol
++udp;
print_udp_packet(buffer , size);
break;
default: //Some Other Protocol like ARP etc.
++others;
break;
}
printf("TCP : %d
UDP : %d
ICMP : %d
IGMP : %d
Others : %d
Total : %d\r"
}
void print_ip_header(unsigned char* Buffer, int Size)
{
unsigned short iphdrlen;
struct iphdr *iph = (struct iphdr *)Buffer;
iphdrlen =iph->ihl*4;
memset(&source, 0, sizeof(source));
source.sin_addr.s_addr = iph->saddr;
memset(&dest, 0, sizeof(dest));
dest.sin_addr.s_addr = iph->daddr;
fprintf(logfile,"\n");
fprintf(logfile,"IP Header\n");
|-IP Version
: %d\n",(unsigned int)iph->version);
fprintf(logfile,"
|-IP Header Length : %d DWORDS or %d Bytes\n",(unsigned int
fprintf(logfile,"
|-Type
Of
Service
: %d\n",(unsigned int)iph->tos);
fprintf(logfile,"
|-IP Total Length
: %d Bytes(Size of Packet)\n",ntohs(iph->tot_len));
fprintf(logfile,"
|-Identification
: %d\n",ntohs(iph->id));
fprintf(logfile,"
//fprintf(logfile,"
|-Reserved ZERO Field
: %d\n",(unsigned int)iphdr->ip_reserved_zero);
//fprintf(logfile,"
|-Dont Fragment Field
: %d\n",(unsigned int)iphdr->ip_dont_fragment);
//fprintf(logfile,"
|-More Fragment Field
: %d\n",(unsigned int)iphdr->ip_more_fragment);
|-TTL
: %d\n",(unsigned int)iph->ttl);
fprintf(logfile,"
|-Protocol : %d\n",(unsigned int)iph->protocol);
fprintf(logfile,"
|-Checksum : %d\n",ntohs(iph->check));
fprintf(logfile,"
|-Source IP
: %s\n",inet_ntoa(source.sin_addr));
fprintf(logfile,"
|-Destination IP
: %s\n",inet_ntoa(dest.sin_addr));
fprintf(logfile,"
}
void print_tcp_packet(unsigned char* Buffer, int Size)
{
unsigned short iphdrlen;
struct iphdr *iph = (struct iphdr *)Buffer;
iphdrlen = iph->ihl*4;
struct tcphdr *tcph=(struct tcphdr*)(Buffer + iphdrlen);
fprintf(logfile,"\n\n***********************TCP Packet*************************\n"
print_ip_header(Buffer,Size);
fprintf(logfile,"\n");
fprintf(logfile,"TCP Header\n");
|-Source Port
: %u\n",ntohs(tcph->source));
fprintf(logfile,"
|-Destination Port : %u\n",ntohs(tcph->dest));
fprintf(logfile,"
|-Sequence Number
: %u\n",ntohl(tcph->seq));
fprintf(logfile,"
|-Acknowledge Number : %u\n",ntohl(tcph->ack_seq));
fprintf(logfile,"
|-Header Length
: %d DWORDS or %d BYTES\n" ,(unsigned
fprintf(logfile,"
//fprintf(logfile,"
|-CWR Flag : %d\n",(unsigned int)tcph->cwr);
23/2/2015 17:58
3 de 7
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
http://www.binarytides.com/packet-sniffer-code-c-linux/
//fprintf(logfile,"
|-ECN Flag : %d\n",(unsigned int)tcph->ece);
|-Urgent Flag
: %d\n",(unsigned int)tcph->urg);
fprintf(logfile,"
|-Acknowledgement Flag : %d\n",(unsigned int)tcph->ack);
fprintf(logfile,"
|-Push Flag
: %d\n",(unsigned int)tcph->psh);
fprintf(logfile,"
|-Reset Flag
: %d\n",(unsigned int)tcph->rst);
fprintf(logfile,"
|-Synchronise Flag
: %d\n",(unsigned int)tcph->syn);
fprintf(logfile,"
|-Finish Flag
: %d\n",(unsigned int)tcph->fin);
fprintf(logfile,"
|-Window
: %d\n",ntohs(tcph->window));
fprintf(logfile,"
|-Checksum
: %d\n",ntohs(tcph->check));
fprintf(logfile,"
|-Urgent Pointer : %d\n",tcph->urg_ptr);
fprintf(logfile,"
fprintf(logfile,"\n");
DATA Dump
");
fprintf(logfile,"
fprintf(logfile,"\n");
fprintf(logfile,"IP Header\n");
PrintData(Buffer,iphdrlen);
fprintf(logfile,"TCP Header\n");
PrintData(Buffer+iphdrlen,tcph->doff*4);
fprintf(logfile,"Data Payload\n");
PrintData(Buffer + iphdrlen + tcph->doff*4 , (Size - tcph->doff*4-iph->ihl*4) );
fprintf(logfile,"\n###########################################################"
}
void print_udp_packet(unsigned char *Buffer , int Size)
{
unsigned short iphdrlen;
struct iphdr *iph = (struct iphdr *)Buffer;
iphdrlen = iph->ihl*4;
struct udphdr *udph = (struct udphdr*)(Buffer + iphdrlen);
fprintf(logfile,"\n\n***********************UDP Packet*************************\n"
print_ip_header(Buffer,Size);
fprintf(logfile,"\nUDP Header\n");
|-Source Port
fprintf(logfile,"
|-Destination Port
fprintf(logfile,"
|-UDP Length
fprintf(logfile,"
|-UDP Checksum
fprintf(logfile,"
:
:
:
:
%d\n"
%d\n"
%d\n"
%d\n"
,
,
,
,
ntohs(udph->source));
ntohs(udph->dest));
ntohs(udph->len));
ntohs(udph->check));
fprintf(logfile,"\n");
fprintf(logfile,"IP Header\n");
PrintData(Buffer , iphdrlen);
fprintf(logfile,"UDP Header\n");
PrintData(Buffer+iphdrlen , sizeof udph);
fprintf(logfile,"Data Payload\n");
PrintData(Buffer + iphdrlen + sizeof udph ,( Size - sizeof udph - iph->ihl * 4 ));
fprintf(logfile,"\n###########################################################"
}
void print_icmp_packet(unsigned char* Buffer , int Size)
{
unsigned short iphdrlen;
struct iphdr *iph = (struct iphdr *)Buffer;
iphdrlen = iph->ihl*4;
struct icmphdr *icmph = (struct icmphdr *)(Buffer + iphdrlen);
fprintf(logfile,"\n\n***********************ICMP Packet*************************\n"
print_ip_header(Buffer , Size);
fprintf(logfile,"\n");
fprintf(logfile,"ICMP Header\n");
|-Type : %d",(unsigned int)(icmph->type));
fprintf(logfile,"
if((unsigned int)(icmph->type) == 11)
fprintf(logfile," (TTL Expired)\n");
else if((unsigned int)(icmph->type) == ICMP_ECHOREPLY)
fprintf(logfile," (ICMP Echo Reply)\n");
|-Code : %d\n",(unsigned int)(icmph->code));
fprintf(logfile,"
|-Checksum : %d\n",ntohs(icmph->checksum));
fprintf(logfile,"
//fprintf(logfile,"
|-ID
: %d\n",ntohs(icmph->id));
//fprintf(logfile,"
|-Sequence : %d\n",ntohs(icmph->sequence));
fprintf(logfile,"\n");
fprintf(logfile,"IP Header\n");
PrintData(Buffer,iphdrlen);
fprintf(logfile,"UDP Header\n");
PrintData(Buffer + iphdrlen , sizeof icmph);
fprintf(logfile,"Data Payload\n");
PrintData(Buffer + iphdrlen + sizeof icmph , (Size - sizeof icmph - iph->ihl * 4));
fprintf(logfile,"\n###########################################################"
}
void PrintData (unsigned char* data , int Size)
{
for(i=0 ; i < Size ; i++)
{
//if one line of hex printing is complete...
if( i!=0 && i%16==0)
{
");
fprintf(logfile,"
for(j=i-16 ; j<i ; j++)
{
if(data[j]>=32 && data[j]<=128)
fprintf(logfile,"%c",(unsigned char)data[j]); //if its a number or alphabet
23/2/2015 17:58
4 de 7
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
http://www.binarytides.com/packet-sniffer-code-c-linux/
");
fprintf(logfile,"
***********************TCP Packet*************************
IP Header
|-IP Version
: 4
|-IP Header Length : 5 DWORDS or 20 Bytes
|-Type Of Service
: 32
|-IP Total Length
: 137 Bytes(Size of Packet)
|-Identification
: 35640
|-TTL
: 51
|-Protocol : 6
|-Checksum : 54397
|-Source IP
: 174.143.119.91
|-Destination IP
: 192.168.1.6
TCP Header
|-Source Port
: 6667
|-Destination Port : 38265
|-Sequence Number
: 1237278529
|-Acknowledge Number : 65363511
|-Header Length
: 5 DWORDS or 20 BYTES
|-Urgent Flag
: 0
|-Acknowledgement Flag : 1
|-Push Flag
: 1
|-Reset Flag
: 0
|-Synchronise Flag
: 0
|-Finish Flag
: 0
|-Window
: 9648
|-Checksum
: 46727
|-Urgent Pointer : 0
DATA Dump
IP Header
45 20 00
C0 A8 01
TCP Header
1A 0B 95
B6 87 00
Data Payload
3A 6B 61
66 66 69
2D 30 30
20 23 23
63 74 6C
75 6D 62
0A
89 8B 38 40 00 33 06 D4 7D AE 8F 77 5B
06
E ...8@.3..}..w[
....
79 49 BF 5F 41 03 E5 5E 37 50 18 25 B0
00
...yI._A..^7P.%.
....
74
6C
30
63
79
65
:kate`!~kate@una
ffiliated/kate/x
-0000001 PRIVMSG
##c :i need exa
ctly the right n
umber of socks!.
.
65
69
30
20
20
72
60
61
30
3A
74
20
21
74
30
69
68
6F
7E
65
31
20
65
66
6B
64
20
6E
20
20
61
2F
50
65
72
73
74
6B
52
65
69
6F
65
61
49
64
67
63
40
74
56
20
68
6B
75
65
4D
65
74
73
6E
2F
53
78
20
21
61
78
47
61
6E
0D
###########################################################
***********************TCP Packet*************************
IP Header
|-IP Version
: 4
|-IP Header Length : 5 DWORDS or 20 Bytes
|-Type Of Service
: 32
|-IP Total Length
: 186 Bytes(Size of Packet)
|-Identification
: 56556
|-TTL
: 48
|-Protocol : 6
|-Checksum : 22899
|-Source IP
: 74.125.71.147
|-Destination IP
: 192.168.1.6
TCP Header
|-Source Port
:
|-Destination Port :
|-Sequence Number
|-Acknowledge Number
|-Header Length
80
49374
: 3136045905
: 2488580377
: 5 DWORDS or 20 BYTES
23/2/2015 17:58
5 de 7
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
|-Urgent Flag
:
|-Acknowledgement Flag :
|-Push Flag
:
|-Reset Flag
:
|-Synchronise Flag
:
|-Finish Flag
:
|-Window
: 44765
|-Checksum
: 15078
|-Urgent Pointer : 0
http://www.binarytides.com/packet-sniffer-code-c-linux/
0
1
1
0
0
0
DATA Dump
IP Header
45 20 00
C0 A8 01
TCP Header
00 50 C0
3A E6 00
Data Payload
48 54 54
20 4D 6F
74 65 6E
73 3A 20
3A 20 54
31 31 20
0A 53 65
2D 58 53
20 31 3B
0D 0A
BA DC EC 00 00 30 06 59 73 4A 7D 47 93
06
E ......0.YsJ}G.
....
DE BA EC 43 51 94 54 B9 19 50 18 AE DD
00
.P....CQ.T..P...
:...
50
64
74
6E
68
31
72
53
20
2F
69
2D
6F
75
33
76
2D
6D
31
66
54
73
2C
3A
65
50
6F
2E
69
79
6E
20
31
72
72
64
31
65
70
69
30
36
3A
6F
65
20
64
65
66
31
3A
20
74
3D
33
0D
2D
66
20
34
73
65
62
30
0A
4F
0D
44
30
66
63
6C
34
58
70
0A
65
20
66
74
6F
20
2D
74
44
63
47
65
69
63
4E
43
69
61
20
4D
0D
6F
6B
6F
6F
6F
74
32
54
0A
6E
0D
74
6E
6E
65
30
0D
58
3A
0A
###########################################################
Note
1. The above sniffer picks up only TCP packets, because of the declaration :
sock_raw = socket(AF_INET , SOCK_RAW , IPPROTO_TCP);
For UDP and ICMP the declaration has to be :
sock_raw = socket(AF_INET , SOCK_RAW , IPPROTO_UDP);
sock_raw = socket(AF_INET , SOCK_RAW , IPPROTO_ICMP);
You might be tempted to think of doing :
sock_raw = socket(AF_INET , SOCK_RAW , IPPROTO_IP);
but this will not work , since IPPROTO_IP is a dummy protocol not a real one.
2. This sniffer picks up only incoming packets.
3. It provides the application with IP frames, which means that ethernet headers are not available.
4. It is not very accurate since it misses out some packets even in the incoming ones.
5. libpcap can also be used to write sniffers. Code example here.
In Part 2 we shall see how the above mentioned drawbacks can be overcome.
Updated on 13 Apr 2012
packet sniffer
Subscribe
Related Posts
C Packet Sniffer Code with libpcap and linux sockets
Packet Sniffer Code in C using Linux Sockets (BSD) Part 2
Code a network packet sniffer in python for Linux
Code a packet sniffer in python with pcapy extension
Tcp syn portscan code in C with Linux sockets
23/2/2015 17:58
6 de 7
http://www.binarytides.com/packet-sniffer-code-c-linux/
41 Comments
Kutlan Turan
how can decode this collected packets? have you got any suggession? mean for example got packets of
sp or text sended how can decode this?
aysh
Hi moon..I used ur coding for my project ...the coding was gud..the nly problem s aftr compiling I got nly
starting..nd nthng was displayed in log.txt..its empty ..wt shld I do to get the right output...pls help me
Sovietmade
Anand
I tried to use the raw sockets to capture the packets from wlan0 and p2p0 (wireless interfaces) but I faced
following issue:
1) The packet was of following format
<eth>--<llc>--<snap>--<ip>.......
In the capture we used read option to get the packet being sent out and received at the wlan0 interface.
2) The issues happens when sending the packet out, the ethernet frame is not completely shown in the dump
printed by using the read.
The first 8 bytes of the ethernet header (same as LLC+SNAP header size) are missing from the capture.
I also checked same packet at wireshark and it was properly captured.
3) On RX side the packet is properly received as per the dump.
Please let me know in which direction I can proceed to check the same.
Mayank
Please provide a link for wireless sniffer in Linux for capturing 802.11 packets
kostya
great code!
can you explain me some thing? I'm just beginner in socket programming.
You use construction as socket(AF_INET , SOCK_RAW , IPPROTO_TMP). i don't understand it. we get
defferent packets (as UDP, TCP) which is above ip-level. Why you don't use parameter IPPROTO_IP?
Silver Moon
Mod
M.Usman
Hi
I want to make a simple packet analyzer which only display the incoming packet header information but i want
to do this with Linux signals any help will be appreciated.
Thanks
Silver Moon
Mod
M.USMAN
Silver Moon
Mod
M.USMAN
HI,
i did make a sniffer with the help of signals, i am thinking way wrong about signals and
23/2/2015 17:58
7 de 7
http://www.binarytides.com/packet-sniffer-code-c-linux/
About us
Contact us
Faq
Advertise
Privacy Policy
23/2/2015 17:58