[英]Python2 porting to Python3: ConfigParser Exceptions - AttributeError on MissingSectionHeaderError
[英]Porting Python2 script to Python3 - struct library
我正在使用socks5代理服務器,現在我正在實施一種ICMP隧道方法,以通過ICMP協議對SSH流量進行隧道傳輸以繞過防火牆限制。
這是我使用的開源: https : //github.com/sanecz/pingtunnel
def create(self):
pack_str = "!BBHHH4sH"
pack_args = [self.type, self.code, 0, self.id, self.sequence,
socket.inet_aton(self.dest[0]), self.dest[1]]
if self.length:
pack_str += "{}s".format(self.length)
pack_args.append(self.data)
self.checksum = self._checksum(struct.pack(pack_str, *pack_args))
pack_args[2] = self.checksum
return struct.pack(pack_str, *pack_args)
特別是這部分代碼給我帶來了麻煩,我必須在 python3 中運行此代碼以匹配我的 Socks5 代理和反向端口轉發。
self.checksum = self._checksum(struct.pack(pack_str, *pack_args))
這一行給了我一個“預期值不是整數”的錯誤。
也在這里:
while count < countTo:
thisVal = ord(packet[count+1]) * 256 + ord(packet[count])
csum = csum + thisVal
csum = csum & 0xffffffff
count = count + 2
if countTo < len(packet):
csum = csum + ord(packet[len(packet) - 1])
csum = csum & 0xffffffff
我刪除了以csum = csum & 0xffffffff
行結尾的csum = csum & 0xffffffff
誰能幫我移植這個 ICMP.py 腳本並解釋一下?
嘿伙計們,我嘗試了幾次后自己解決了這個問題!
這是編輯后的代碼:
#!/usr/bin/python3
import socket
import struct
ICMP_ECHO = 0
ICMP_ECHO_REQUEST = 8
class ICMPPacket(object):
def __init__(self, type, code, checksum, id,
sequence, data, source_ip, dest=(None, None)):
self.type, self.code, self.checksum = type, code, checksum
self.id, self.sequence, self.data = id, sequence, data
self.dest = dest
self.source_ip = source_ip
self.length = len(self.data)
def __repr__(self):
return "<ICMP packet: type = {s.type}, code = {s.code}, " \
"data length = {length}".format(s=self, length=len(self.data))
def __str__(self):
return "Type of message: {s.type}, Code {s.code},"\
"Checksum: {s.checksum}, ID: {s.id}, Sequence: {s.sequence}, " \
"Data: {s.data}, Data length: {length}".format(s=self, length=len(self.data))
def create(self):
#print("\nEntering CREATE!!\n\n")
pack_str = "!BBHHH4sH"
pack_args = [self.type, self.code, 0, self.id, self.sequence,
socket.inet_aton(self.dest[0]), self.dest[1]]
if self.length:
pack_str += "{}s".format(self.length)
#print("PACK STR: " + pack_str)
pack_args.append(self.data)
#print("Pack ARGS: \n", pack_args, "\n")
self.checksum = self._checksum(struct.pack(pack_str, *pack_args))
#print("CHECKSUM: ", self.checksum)
pack_args[2] = self.checksum
return struct.pack(pack_str, *pack_args)
@classmethod
def parse(cls, packet):
ip_pack_str = "BBHHHBBH4s4s"
icmp_pack_str = "!BBHHH4sH"
data = ""
ip_packet, icmp_packet = packet[:20], packet[20:] # split ip header
ip_packet = struct.unpack(ip_pack_str, ip_packet)
source_ip = ip_packet[8]
icmp_pack_len = struct.calcsize(icmp_pack_str)
packet_len = len(icmp_packet) - icmp_pack_len
if packet_len > 0:
icmp_data_str = "{}s".format(packet_len)
data = struct.unpack(icmp_data_str, icmp_packet[icmp_pack_len:])[0]
type, code, checksum, id, sequence, dest_ip, \
dest_port = struct.unpack(icmp_pack_str, icmp_packet[:icmp_pack_len])
return cls(type, code, checksum, id, sequence, data,
socket.inet_ntoa(source_ip),
(socket.inet_ntoa(dest_ip), dest_port))
@staticmethod
def _checksum(packet):
#print("Argument for checksum: !!\n",packet)
packet = packet.decode('ISO-8859-1') # edited to match python3
csum = 0
countTo = (len(packet) / 2) * 2
count = 0
while count < countTo:
thisVal = ord(packet[count+1]) * 256 + ord(packet[count])
#print("THISVAL: ", thisVal)
csum = csum + thisVal
csum = csum & 0xffffffff
count = count + 2
if countTo < len(packet):
csum = csum + ord(packet[len(packet) - 1])
csum = csum & 0xffffffff
csum = (csum >> 16) + (csum & 0xffff)
csum = csum + (csum >> 16)
checksum = ~csum
checksum = checksum & 0xffff
checksum = checksum >> 8 | (checksum << 8 & 0xff00)
return checksum
我使用packet = packet.decode('ISO-8859-1')
重新編碼數據包以匹配字節
為了匹配這一行thisVal = ord(packet[count+1]) * 256 + ord(packet[count])
因為它需要一個字符串,而它卻收到了一個 INT。
因此將其解碼為字符串解決了這個問題!
編輯:如果您對更好的編碼處理數據包的二進制數據有任何建議,請告訴我。
聲明:本站的技術帖子網頁,遵循CC BY-SA 4.0協議,如果您需要轉載,請注明本站網址或者原文地址。任何問題請咨詢:yoyou2525@163.com.