如果之前有人问过这个问题,我深表歉意,但我无法找到这个问题的任何记录。完全披露:我只使用了几个月的 Python 和大约 1 个月的 MySQL。
我在 Raspberry Pi(运行 Raspbian Wheezy)上编写了一个简短的 Python 脚本,它嗅探 wifi 数据包并将信号强度信息写入 MySQL 数据库。我还创建了一个小的 PHP 文件,它从数据库中获取信息并将其呈现在一个表中(非常基本)。这个小系统的所有组件都按计划工作,但是......
当我在后台运行 Python 脚本 (sudo python my_script.py &) 时,它似乎没有用新读数更新 MySQL 数据库。然而,它也不会抛出任何错误并毫无问题地输出到控制台(每次拦截 wifi 数据包并将其 RSSI 添加到数据库时,我都会打印一行)。我在使用 /etc/rc.local 文件启动脚本时遇到了同样的问题。没有错误,但数据库中也没有更新。
问题出在 Python 方面吗?我需要更改的 MySQL 设置?还有什么我完全想念的吗?
编辑添加代码:
#!/usr/bin/python
# -*- coding: utf-8 -*-
import MySQLdb as mdb
import sys
from scapy.all import *
# Create connection to MySQL database called 'DATABASE' at localhost with username 'USERNAME' and password 'PASSWORD'
HOST = "localhost"
USER = "USERNAME"
PW = "PASSWORD"
DB = "DATABASE"
con = mdb.connect(HOST, USER, PW, DB)
# set interface that will be used to monitor wifi
interface = "mon0"
with con:
cur = con.cursor()
# This function will be called every time a packet is intercepted. Packet is passed to function as 'p'
def sniffmgmt(p):
# These are the 3 types of management frames that are sent exclusively by clients (allows us to weed out packets sent by APs)
stamgmtstypes = (0, 2, 4)
if p.haslayer(Dot11):
# Make sure packet is a client-only type
if p.subtype in stamgmtstypes:
# Calculate RSSI
sig_str = -(256-(ord(p.notdecoded[-4:-3])))
# Update database with most recent detection
cur.execute("REPLACE INTO attendance(mac_address, rssi, timestamp) VALUES('%s', %d, NOW())" % (p.addr2, sig_str))
# Print MAC address that was detected (debugging only)
print "MAC Address (%s) has been logged" % (p.addr2)
# Tell scapy what interface to use (see above) and which function to call when a packet is intercepted. lfilter limits packets to management frames.
sniff(iface=interface, prn=sniffmgmt, store=0, lfilter=lambda x:x.type==0)
谢谢!凯尔
PS 对于那些想知道的人:这不是为了恶意使用,它被用来调查我们仓库的产品跟踪技术。