网络安全检测工具 - ARP、ICMP 和 TCP 攻击检测
import tkinter as tk
import os
import sys
import time
import threading
import netifaces
from scapy.all import *
from scapy.layers.l2 import ARP
from tkinter import messagebox
from scapy.layers.l2 import getmacbyip
# 登录页面
class LoginWindow:
def __init__(self):
self.root = tk.Tk()
self.root.title('Login')
self.root.geometry('300x150')
tk.Label(self.root, text='Username').place(x=50, y=30)
self.username_entry = tk.Entry(self.root)
self.username_entry.place(x=120, y=30)
tk.Label(self.root, text='Password').place(x=50, y=60)
self.password_entry = tk.Entry(self.root, show='*')
self.password_entry.place(x=120, y=60)
self.login_button = tk.Button(self.root, text='Login', command=self.login)
self.login_button.place(x=100, y=100)
self.register_button = tk.Button(self.root, text='Register', command=self.register)
self.register_button.place(x=170, y=100)
self.root.mainloop()
def show_main_window(self):
self.root.destroy()
MainWindow()
def login(self):
username = self.username_entry.get()
password = self.password_entry.get()
for user in users:
if user['username'] == username and user['password'] == password:
# 登录成功,跳转到主界面
self.show_main_window()
return
# 登录失败,弹出错误提示
messagebox.showinfo('错误', '用户名或密码错误')
def register(self):
username = self.username_entry.get()
password = self.password_entry.get()
for user in users:
if user['username'] == username:
# 用户名已存在,弹出错误提示
messagebox.showerror('错误', '用户名已存在')
return
# 用户名不存在,将新用户添加到用户列表中
users.append({'username': username, 'password': password})
# 注册成功,弹出成功提示
messagebox.showinfo('提示', '注册成功,请登录')
# 主页面
class MainWindow:
def __init__(self):
self.root = tk.Tk()
self.root.title('网络安全检测工具')
self.root.geometry('400x350')
self.arp_page = ArpDetectorPage(self.root, 'ens33', 60)
self.icmp_page = IcmpFloodDetectorPage(self.root, 'ens33', 60)
self.tcp_page = TcpAttackDetectorPage(self.root, 'ens33', 60)
self.network_page = NetworkScannerPage(self.root, 'ens33')
self.current_page = None
self.show_page(self.arp_page)
self.arp_button = tk.Button(self.root, text='ARP 检测', command=lambda: self.show_page(self.arp_page))
self.arp_button.pack()
self.icmp_button = tk.Button(self.root, text='ICMP 洪泛检测', command=lambda: self.show_page(self.icmp_page))
self.icmp_button.pack()
self.tcp_button = tk.Button(self.root, text='TCP 攻击检测', command=lambda: self.show_page(self.tcp_page))
self.tcp_button.pack()
self.network_button = tk.Button(self.root, text='网络扫描', command=lambda: self.show_page(self.network_page))
self.network_button.pack()
self.root.mainloop()
def show_page(self, page):
if self.current_page:
self.current_page.frame.pack_forget()
self.current_page = page
self.current_page.frame.pack()
# ArpDetector页面
class ArpDetectorPage:
def __init__(self, parent, interface, timeout):
self.parent = parent
self.interface = interface
self.timeout = timeout
self.ip_mac_map = {}
self.attacker_ip = None
self.attacker_mac = None
self.thread = None
self.stop_event = threading.Event()
self.timer = 0
self.frame = tk.Frame(self.parent)
self.status_label = tk.Label(self.frame, text='Idle')
self.status_label.pack()
self.start_button = tk.Button(self.frame, text='Start', command=self.start_detection)
self.start_button.pack()
self.stop_button = tk.Button(self.frame, text='Stop', command=self.stop_detection, state=tk.DISABLED)
self.stop_button.pack()
def start_detection(self):
self.status_label.config(text='Running')
self.start_button.config(state=tk.DISABLED)
self.stop_button.config(state=tk.NORMAL)
self.thread = threading.Thread(target=self.run)
self.thread.start()
def stop_detection(self):
self.status_label.config(text='Idle')
self.start_button.config(state=tk.NORMAL)
self.stop_button.config(state=tk.DISABLED)
self.stop_event.set()
self.thread.join()
def run(self):
self.attacker_ip = netifaces.ifaddresses(self.interface)[netifaces.AF_INET][0]['addr']
self.attacker_mac = getmacbyip(self.attacker_ip)
print(f'Attacker IP: {self.attacker_ip}, MAC: {self.attacker_mac}')
while not self.stop_event.is_set():
self.scan_network()
self.detect_arp_spoofing()
time.sleep(5)
self.timer += 5
if self.timer >= self.timeout:
print('No ARP spoofing detected')
self.stop_event.set()
def scan_network(self):
for ip in netifaces.ifaddresses(self.interface)[netifaces.AF_INET][0]['addr'].split('.')[:-1]:
for i in range(1, 255):
target_ip = f'{ip}.{i}'
if target_ip != self.attacker_ip:
arp_request = ARP(pdst=target_ip)
arp_reply = sr1(arp_request, timeout=1, verbose=0)
if arp_reply and arp_reply.hwsrc not in ('00:00:00:00:00:00', self.attacker_mac):
self.ip_mac_map[target_ip] = arp_reply.hwsrc
def detect_arp_spoofing(self):
for target_ip, target_mac in self.ip_mac_map.items():
arp_request = ARP(op=1, pdst=target_ip, hwdst=target_mac, psrc=self.attacker_ip, hwsrc=self.attacker_mac)
arp_reply = sr1(arp_request, timeout=1, verbose=0)
if arp_reply and arp_reply.hwsrc != target_mac:
print(f'ARP spoofing detected: {target_ip} ({target_mac}) -> {arp_reply.hwsrc}')
# IcmpFloodDetector页面
class IcmpFloodDetectorPage:
def __init__(self, parent, interface, timeout):
self.parent = parent
self.interface = interface
self.timeout = timeout
self.attacker_ip = None
self.thread = None
self.stop_event = threading.Event()
self.timer = 0
self.frame = tk.Frame(self.parent)
self.status_label = tk.Label(self.frame, text='Idle')
self.status_label.pack()
self.start_button = tk.Button(self.frame, text='Start', command=self.start_detection)
self.start_button.pack()
self.stop_button = tk.Button(self.frame, text='Stop', command=self.stop_detection, state=tk.DISABLED)
self.stop_button.pack()
def start_detection(self):
self.status_label.config(text='Running')
self.start_button.config(state=tk.DISABLED)
self.stop_button.config(state=tk.NORMAL)
self.thread = threading.Thread(target=self.run)
self.thread.start()
def stop_detection(self):
self.status_label.config(text='Idle')
self.start_button.config(state=tk.NORMAL)
self.stop_button.config(state=tk.DISABLED)
self.stop_event.set()
self.thread.join()
def run(self):
self.attacker_ip = netifaces.ifaddresses(self.interface)[netifaces.AF_INET][0]['addr']
print(f'Attacker IP: {self.attacker_ip}')
while not self.stop_event.is_set():
self.detect_icmp_flood()
time.sleep(5)
self.timer += 5
if self.timer >= self.timeout:
print('No ICMP spoofing detected')
self.stop_event.set()
def detect_icmp_flood(self):
icmp_packets = sniff(filter=f'icmp and src host {self.attacker_ip}', timeout=1, count=10)
if len(icmp_packets) == 10:
print('ICMP flood detected')
# TcpAttackDetector页面
class TcpAttackDetectorPage:
def __init__(self, parent, interface, timeout):
self.parent = parent
self.interface = interface
self.timeout = timeout
self.attacker_ip = None
self.thread = None
self.stop_event = threading.Event()
self.timer = 0
self.frame = tk.Frame(self.parent)
self.status_label = tk.Label(self.frame, text='Idle')
self.status_label.pack()
self.start_button = tk.Button(self.frame, text='Start', command=self.start_detection)
self.start_button.pack()
self.stop_button = tk.Button(self.frame, text='Stop', command=self.stop_detection, state=tk.DISABLED)
self.stop_button.pack()
def start_detection(self):
self.status_label.config(text='Running')
self.start_button.config(state=tk.DISABLED)
self.stop_button.config(state=tk.NORMAL)
self.thread = threading.Thread(target=self.run)
self.thread.start()
def stop_detection(self):
self.status_label.config(text='Idle')
self.start_button.config(state=tk.NORMAL)
self.stop_button.config(state=tk.DISABLED)
self.stop_event.set()
self.thread.join()
def run(self):
self.attacker_ip = netifaces.ifaddresses(self.interface)[netifaces.AF_INET][0]['addr']
print(f'Attacker IP: {self.attacker_ip}')
while not self.stop_event.is_set():
self.detect_tcp_attack()
time.sleep(5)
self.timer += 5
if self.timer >= self.timeout:
print('No TCP spoofing detected')
self.stop_event.set()
def detect_tcp_attack(self):
tcp_packets = sniff(filter=f'tcp and src host {self.attacker_ip}', timeout=1, count=10)
if len(tcp_packets) == 10:
print('TCP attack detected')
# NetworkScanner页面
class NetworkScannerPage:
def __init__(self, parent, interface):
self.parent = parent
self.interface = interface
self.ip_mac_map = {}
self.thread = None
self.stop_event = threading.Event()
self.frame = tk.Frame(self.parent)
self.status_label = tk.Label(self.frame, text='Idle')
self.status_label.pack()
self.start_button = tk.Button(self.frame, text='Start', command=self.start_detection)
self.start_button.pack()
self.stop_button = tk.Button(self.frame, text='Stop', command=self.stop_detection, state=tk.DISABLED)
self.stop_button.pack()
def start_detection(self):
self.status_label.config(text='Running')
self.start_button.config(state=tk.DISABLED)
self.stop_button.config(state=tk.NORMAL)
self.thread = threading.Thread(target=self.run)
self.thread.start()
def stop_detection(self):
self.status_label.config(text='Idle')
self.start_button.config(state=tk.NORMAL)
self.stop_button.config(state=tk.DISABLED)
self.stop_event.set()
self.thread.join()
def run(self):
while not self.stop_event.is_set():
self.scan_network()
time.sleep(10)
def scan_network(self):
for ip in netifaces.ifaddresses(self.interface)[netifaces.AF_INET][0]['addr'].split('.')[:-1]:
for i in range(1, 255):
target_ip = f'{ip}.{i}'
if target_ip not in self.ip_mac_map:
arp_request = ARP(pdst=target_ip)
arp_reply = sr1(arp_request, timeout=1, verbose=0)
if arp_reply and arp_reply.hwsrc not in ('00:00:00:00:00:00', 'ff:ff:ff:ff:ff:ff'):
self.ip_mac_map[target_ip] = arp_reply.hwsrc
print(f'Found: {target_ip} ({arp_reply.hwsrc})')
self.save_to_file(target_ip, arp_reply.hwsrc)
def save_to_file(self, ip, mac):
with open('network_scan.txt', 'a') as f:
f.write(f'{ip},{mac}
')
if __name__ == '__main__':
users = [{'username': 'admin', 'password': 'admin'}]
login_window = LoginWindow()
main_window = MainWindow()
原文地址: https://www.cveoy.top/t/topic/jnVG 著作权归作者所有。请勿转载和采集!