test: added sigtran decode/re-encode testing script
This commit is contained in:
parent
53ff7fbe6f
commit
5fe2f951e3
File diff suppressed because one or more lines are too long
|
@ -0,0 +1,12 @@
|
|||
Created from pcaps publicly available on https://pcapr.net
|
||||
|
||||
attach_sccp_xudts.pcap
|
||||
dump.cap
|
||||
gprs_ms_log.pcap
|
||||
LU.pcap
|
||||
sri_sm.pcap
|
||||
test.pcap
|
||||
tmp.pcap
|
||||
|
||||
Created by the following command
|
||||
tshark -T ek -x -j tcap -r trace.pcap >> tcapmap.json
|
|
@ -0,0 +1,127 @@
|
|||
#!/usr/bin/python
|
||||
|
||||
# -*- coding: UTF-8 -*-
|
||||
#/**
|
||||
# * Sigtran test utility
|
||||
# * Script to test pycrate decoding/re-encoding for BER / Sigtran
|
||||
# * Script is using tshark json pipe input which was generated from real pcap
|
||||
# *
|
||||
# * Usage:
|
||||
# * Use any sigtran or ss7 pcap (trace.pcap)
|
||||
# * ./tshark -T ek -x -j tcap -r trace.pcap > trace.json
|
||||
# * python test_tcapmap.py
|
||||
# *
|
||||
# * Copyright 2017 Martin Kacer, H21 lab
|
||||
# *
|
||||
# *
|
||||
# *
|
||||
# * Software Name : pycrate
|
||||
# * Version : 0.2
|
||||
# *
|
||||
# * Copyright 2017 Benoit Michau. ANSSI.
|
||||
# *
|
||||
# * This program is free software: you can redistribute it and/or modify
|
||||
# * it under the terms of the GNU General Public License version 2 as published
|
||||
# * by the Free Software Foundation.
|
||||
# *
|
||||
# * This program is distributed in the hope that it will be useful,
|
||||
# * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# * GNU General Public License for more details.
|
||||
# *
|
||||
# * You will find a copy of the terms and conditions of the GNU General Public
|
||||
# * License version 2 in the "license.txt" file or
|
||||
# * see http://www.gnu.org/licenses/ or write to the Free Software Foundation,
|
||||
# * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
||||
# *
|
||||
# *--------------------------------------------------------
|
||||
# * File Name : test_tcapmap.py
|
||||
# * Created : 2017-11-30
|
||||
# * Authors : Martin Kacer
|
||||
# *--------------------------------------------------------
|
||||
#*/
|
||||
|
||||
import sys
|
||||
import time
|
||||
import random
|
||||
import traceback
|
||||
import binascii
|
||||
from pycrate_asn1dir import TCAP_MAP
|
||||
|
||||
# Global options to control the script behavior
|
||||
option_print_verbose = True # print verbose decoding output
|
||||
option_fuzzing_messages = True # fuzz messages before pycrate decoding
|
||||
option_reencode = True # re-encode into hex and compare with the hex input
|
||||
#
|
||||
|
||||
|
||||
with open('res/tcapmap_pcapr.json') as f:
|
||||
lines = f.readlines()
|
||||
for s in lines:
|
||||
|
||||
i = s.find('"tcap_raw": "')
|
||||
ln = len('"tcap_raw": "')
|
||||
if (i > 0):
|
||||
#print(s[i:])
|
||||
subs = s[i+ln:]
|
||||
l = subs.find('"')
|
||||
tcap_hex = subs[0:l]
|
||||
|
||||
if (option_print_verbose):
|
||||
print("HEX IN: " + tcap_hex)
|
||||
|
||||
# fuzzing of messages
|
||||
if (option_fuzzing_messages):
|
||||
for i in range (0, 1):
|
||||
if tcap_hex != '':
|
||||
tcap_hex_f = tcap_hex
|
||||
position = int(random.randint(0, len(tcap_hex_f))/2)
|
||||
position = position * 2
|
||||
tcap_hex_f = tcap_hex_f[:position] + format(random.randint(0, 255), '02x') + tcap_hex_f[position + 2:]
|
||||
tcap_hex = tcap_hex_f
|
||||
|
||||
if (option_print_verbose):
|
||||
print("FUZZ IN: " + tcap_hex)
|
||||
|
||||
try:
|
||||
# decode using pycrate
|
||||
tcap = TCAP_MAP.TCAP_MAP_Messages.TCAP_MAP_Message
|
||||
tcap.from_ber(binascii.unhexlify(tcap_hex))
|
||||
|
||||
tcap_decoded = tcap.get_val()
|
||||
# verbose output
|
||||
if (option_print_verbose):
|
||||
print(tcap_decoded)
|
||||
print(tcap.to_asn1())
|
||||
#
|
||||
|
||||
# re-encode using pycrate
|
||||
if (option_reencode == True):
|
||||
tcap.set_val(tcap_decoded)
|
||||
tcap_hex_out = str(binascii.hexlify(tcap.to_ber()))
|
||||
if (option_print_verbose):
|
||||
print("HEX OUT:" + tcap_hex_out)
|
||||
|
||||
# decode again and try to check diff
|
||||
tcap_reencoded = TCAP_MAP.TCAP_MAP_Messages.TCAP_MAP_Message
|
||||
tcap_reencoded.from_ber(binascii.unhexlify(tcap_hex))
|
||||
tcap_decoded = str(tcap.get_val())
|
||||
tcap_reencoded_decoded = str(tcap.get_val())
|
||||
if (tcap_decoded != tcap_reencoded_decoded):
|
||||
print("!!!!!!! Re-encoding error begin !!!!!!!")
|
||||
print("ENCODED IN: " + tcap_hex)
|
||||
print("RE-RENCODED: " + tcap_hex_out)
|
||||
print(tcap_decoded)
|
||||
print(tcap_reencoded_decoded)
|
||||
print("!!!!!!! Re-encoding error end !!!!!!!")
|
||||
#
|
||||
|
||||
#
|
||||
|
||||
except Exception as err:
|
||||
print("!!!!!!! Exception begin !!!!!!!")
|
||||
print(err)
|
||||
traceback.print_exc()
|
||||
print("!!!!!!! Exception end !!!!!!!")
|
||||
|
||||
|
Loading…
Reference in New Issue