2

如果之前有人问过这个问题,我深表歉意,但我无法找到这个问题的任何记录。完全披露:我只使用了几个月的 Python 和大约 1 个月的 MySQL。

我在 Raspberry Pi(运行 Raspbian Wheezy)上编写了一个简短的 Python 脚本,它嗅探 wifi 数据包并将信号强度信息写入 MySQL 数据库。我还创建了一个小的 PHP 文件,它从数据库中获取信息并将其呈现在一个表中(非常基本)。这个小系统的所有组件都按计划工作,但是......

当我在后台运行 Python 脚本 (sudo python my_script.py &) 时,它似乎没有用新读数更新 MySQL 数据库。然而,它也不会抛出任何错误并毫无问题地输出到控制台(每次拦截 wifi 数据包并将其 RSSI 添加到数据库时,我都会打印一行)。我在使用 /etc/rc.local 文件启动脚本时遇到了同样的问题。没有错误,但数据库中也没有更新。

问题出在 Python 方面吗?我需要更改的 MySQL 设置?还有什么我完全想念的吗?

编辑添加代码:

#!/usr/bin/python
# -*- coding: utf-8 -*-

import MySQLdb as mdb
import sys
from scapy.all import *

# Create connection to MySQL database called 'DATABASE' at localhost with username 'USERNAME' and password 'PASSWORD'
HOST = "localhost"
USER = "USERNAME"
PW = "PASSWORD"
DB = "DATABASE"

con = mdb.connect(HOST, USER, PW, DB)

# set interface that will be used to monitor wifi
interface = "mon0"

with con:

        cur = con.cursor()

        # This function will be called every time a packet is intercepted. Packet is passed to function as 'p'
        def sniffmgmt(p):

                # These are the 3 types of management frames that are sent exclusively by clients (allows us to weed out packets sent by APs)
                stamgmtstypes = (0, 2, 4)

                if p.haslayer(Dot11):

                        # Make sure packet is a client-only type
                        if p.subtype in stamgmtstypes:

                                # Calculate RSSI
                                sig_str = -(256-(ord(p.notdecoded[-4:-3])))

                                # Update database with most recent detection
                                cur.execute("REPLACE INTO attendance(mac_address, rssi, timestamp) VALUES('%s', %d, NOW())" % (p.addr2, sig_str))

                                # Print MAC address that was detected (debugging only)
                                print "MAC Address (%s) has been logged" % (p.addr2)

        # Tell scapy what interface to use (see above) and which function to call when a packet is intercepted. lfilter limits packets to management frames.
        sniff(iface=interface, prn=sniffmgmt, store=0, lfilter=lambda x:x.type==0)

谢谢!凯尔

PS 对于那些想知道的人:这不是为了恶意使用,它被用来调查我们仓库的产品跟踪技术。

4

1 回答 1

2

我希望您不会调用commitdb 事务。

于 2013-04-26T15:19:53.060 回答