我正在尝试使用此处提供的 dpkt 库从 pcap 文件中生成所有域名及其对应 IP 地址的列表
我的代码主要基于此
filename = raw_input('Type filename of pcap file (without extention): ')
path = 'c:/temp/PcapParser/' + filename + '.pcap'
f = open(path, 'rb')
pcap = dpkt.pcap.Reader(f)
for ts, buf in pcap:
#make sure we are dealing with IP traffic
try:
eth = dpkt.ethernet.Ethernet(buf)
except:
continue
if eth.type != 2048:
continue
#make sure we are dealing with UDP protocol
try:
ip = eth.data
except:
continue
if ip.p != 17:
continue
#filter on UDP assigned ports for DNS
try:
udp = ip.data
except:
continue
if udp.sport != 53 and udp.dport != 53:
continue
#make the dns object out of the udp data and
#check for it being a RR (answer) and for opcode QUERY
try:
dns = dpkt.dns.DNS(udp.data)
except:
continue
if dns.qr != dpkt.dns.DNS_R:
continue
if dns.opcode != dpkt.dns.DNS_QUERY:
continue
if dns.rcode != dpkt.dns.DNS_RCODE_NOERR:
continue
if len(dns.an) < 1:
continue
#process and print responses based on record type
for answer in dns.an:
if answer.type == 1: #DNS_A
print 'Domain Name: ', answer.name, '\tIP Address: ', socket.inet_ntoa(answer.rdata)
问题是 answer.name 对我来说不够好,因为我需要请求的原始域名,而不是它的 CNAME 表示。例如,原始 DNS 请求之一是 for www.paypal.com
,但它的 CNAME 表示是paypal.112.2o7.net
.
我仔细查看了代码,意识到我实际上是从 DNS 响应(而不是查询)中提取信息。然后我查看了wireshark中的响应包,发现原来的域就在那里,在“查询”和“答案”下,所以我的问题是如何提取它?
谢谢!