ruby-masscan 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.document +3 -0
- data/.editorconfig +11 -0
- data/.github/workflows/ruby.yml +29 -0
- data/.gitignore +11 -0
- data/.rspec +1 -0
- data/.yardopts +1 -0
- data/ChangeLog.md +6 -0
- data/Gemfile +15 -0
- data/LICENSE.txt +20 -0
- data/README.md +139 -0
- data/Rakefile +23 -0
- data/gemspec.yml +28 -0
- data/lib/masscan/banner.rb +11 -0
- data/lib/masscan/output_file.rb +100 -0
- data/lib/masscan/parsers/binary.rb +591 -0
- data/lib/masscan/parsers/json.rb +106 -0
- data/lib/masscan/parsers/list.rb +84 -0
- data/lib/masscan/parsers/plain_text.rb +151 -0
- data/lib/masscan/parsers.rb +3 -0
- data/lib/masscan/program.rb +100 -0
- data/lib/masscan/status.rb +7 -0
- data/lib/masscan/task.rb +179 -0
- data/lib/masscan/version.rb +4 -0
- data/lib/masscan.rb +2 -0
- data/ruby-masscan.gemspec +61 -0
- data/spec/fixtures/masscan.bin +0 -0
- data/spec/fixtures/masscan.json +17 -0
- data/spec/fixtures/masscan.list +10 -0
- data/spec/fixtures/masscan.ndjson +8 -0
- data/spec/fixtures/masscan.xml +17 -0
- data/spec/output_file_spec.rb +135 -0
- data/spec/parsers/binary_spec.rb +224 -0
- data/spec/parsers/json_spec.rb +157 -0
- data/spec/parsers/list_spec.rb +109 -0
- data/spec/parsers/parser_examples.rb +58 -0
- data/spec/parsers/plain_text_spec.rb +116 -0
- data/spec/spec_helper.rb +11 -0
- data/spec/task_spec.rb +121 -0
- metadata +117 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA256:
|
3
|
+
metadata.gz: 221aba609e42676f60a8ff8ca50017f52b107ce4bbfd09b2d17fac243e876db8
|
4
|
+
data.tar.gz: 92ffeee1fd37297f5a1731fb2af18d5409c99ceda7704beab4f762e9270e85e3
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: f3cb61b85ec433a38a77e5f3993902fb48c340ee8eb6a2476ad98afc8369f33a55ade52fb75f55bcde9f36251da1cea84e5215f717b33821af733744d22087e6
|
7
|
+
data.tar.gz: 4224460de4162eeb091db2d5d194e66eec3c81bea585c64101adadbfc9c959dfdecae482c7c607717d828f2922ef82b99c2d52f99a0b146153cafe3b8e724add
|
data/.document
ADDED
data/.editorconfig
ADDED
@@ -0,0 +1,29 @@
|
|
1
|
+
name: CI
|
2
|
+
|
3
|
+
on: [ push, pull_request ]
|
4
|
+
|
5
|
+
jobs:
|
6
|
+
tests:
|
7
|
+
runs-on: ubuntu-latest
|
8
|
+
strategy:
|
9
|
+
fail-fast: false
|
10
|
+
matrix:
|
11
|
+
ruby:
|
12
|
+
- 2.4
|
13
|
+
- 2.5
|
14
|
+
- 2.6
|
15
|
+
- 2.7
|
16
|
+
- 3.0
|
17
|
+
- jruby
|
18
|
+
- truffleruby
|
19
|
+
name: Ruby ${{ matrix.ruby }}
|
20
|
+
steps:
|
21
|
+
- uses: actions/checkout@v2
|
22
|
+
- name: Set up Ruby
|
23
|
+
uses: ruby/setup-ruby@v1
|
24
|
+
with:
|
25
|
+
ruby-version: ${{ matrix.ruby }}
|
26
|
+
- name: Install dependencies
|
27
|
+
run: bundle install --jobs 4 --retry 3
|
28
|
+
- name: Run tests
|
29
|
+
run: bundle exec rake test
|
data/.gitignore
ADDED
data/.rspec
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
--colour --format documentation
|
data/.yardopts
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
--markup markdown --title 'Ruby Masscan Documentation' --protected
|
data/ChangeLog.md
ADDED
data/Gemfile
ADDED
@@ -0,0 +1,15 @@
|
|
1
|
+
source 'https://rubygems.org'
|
2
|
+
|
3
|
+
gemspec
|
4
|
+
|
5
|
+
group :development do
|
6
|
+
gem 'rake'
|
7
|
+
gem 'rubygems-tasks', '~> 0.2'
|
8
|
+
gem 'rspec', '~> 3.0'
|
9
|
+
|
10
|
+
gem 'json'
|
11
|
+
gem 'simplecov', '~> 0.7'
|
12
|
+
gem 'kramdown'
|
13
|
+
gem 'yard', '~> 0.9'
|
14
|
+
gem 'yard-spellcheck', require: false
|
15
|
+
end
|
data/LICENSE.txt
ADDED
@@ -0,0 +1,20 @@
|
|
1
|
+
Copyright (c) 2021 Hal Brodigan
|
2
|
+
|
3
|
+
Permission is hereby granted, free of charge, to any person obtaining
|
4
|
+
a copy of this software and associated documentation files (the
|
5
|
+
'Software'), to deal in the Software without restriction, including
|
6
|
+
without limitation the rights to use, copy, modify, merge, publish,
|
7
|
+
distribute, sublicense, and/or sell copies of the Software, and to
|
8
|
+
permit persons to whom the Software is furnished to do so, subject to
|
9
|
+
the following conditions:
|
10
|
+
|
11
|
+
The above copyright notice and this permission notice shall be
|
12
|
+
included in all copies or substantial portions of the Software.
|
13
|
+
|
14
|
+
THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,
|
15
|
+
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
16
|
+
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
17
|
+
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
18
|
+
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
19
|
+
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
20
|
+
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
data/README.md
ADDED
@@ -0,0 +1,139 @@
|
|
1
|
+
# ruby-masscan
|
2
|
+
|
3
|
+
[![CI](https://github.com/postmodern/ruby-masscan/actions/workflows/ruby.yml/badge.svg)](https://github.com/postmodern/ruby-masscan/actions/workflows/ruby.yml)
|
4
|
+
[![Gem Version](https://badge.fury.io/rb/ruby-masscan.svg)](https://badge.fury.io/rb/ruby-masscan)
|
5
|
+
|
6
|
+
* [Source](https://github.com/postmodern/ruby-masscan/)
|
7
|
+
* [Issues](https://github.com/postmodern/ruby-masscan/issues)
|
8
|
+
* [Documentation](http://rubydoc.info/gems/ruby-masscan/frames)
|
9
|
+
|
10
|
+
## Description
|
11
|
+
|
12
|
+
A Ruby interface to [masscan], an Internet-scale port scanner.
|
13
|
+
Allows automating masscan and parsing masscan Binary, List, and JSON output
|
14
|
+
file formats.
|
15
|
+
|
16
|
+
## Features
|
17
|
+
|
18
|
+
* Provides a Ruby interface for running the `masscan` command.
|
19
|
+
* Supports parsing masscan Binary, List, and JSON output files.
|
20
|
+
|
21
|
+
## Examples
|
22
|
+
|
23
|
+
Run `sudo masscan` from Ruby:
|
24
|
+
|
25
|
+
```ruby
|
26
|
+
require 'masscan/program'
|
27
|
+
|
28
|
+
Masscan::Program.sudo_scan do |masscan|
|
29
|
+
masscan.output_format = :list
|
30
|
+
masscan.output_file = 'masscan.txt'
|
31
|
+
|
32
|
+
masscan.ips = '192.168.1.1/24'
|
33
|
+
masscan.ports = [20,21,22,23,25,80,110,443,512,522,8080,1080]
|
34
|
+
end
|
35
|
+
```
|
36
|
+
|
37
|
+
Parse a `masscan` output file and guess the format:
|
38
|
+
|
39
|
+
```ruby
|
40
|
+
require 'masscan/output_file'
|
41
|
+
|
42
|
+
output_file = Masscan::OutputFile.new('masscan.txt')
|
43
|
+
output.format
|
44
|
+
# => :list
|
45
|
+
```
|
46
|
+
|
47
|
+
Parse `masscan` Binary output files:
|
48
|
+
|
49
|
+
```ruby
|
50
|
+
output_file = Masscan::OutputFile.new('masscan.scan', format: :binary)
|
51
|
+
output_file.each do |record|
|
52
|
+
p record
|
53
|
+
end
|
54
|
+
```
|
55
|
+
|
56
|
+
```
|
57
|
+
#<struct Masscan::Status status=:open, protocol=:tcp, port=80, reason=[:syn, :ack], ttl=54, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-26 16:07:33 -0700, mac=nil>
|
58
|
+
#<struct Masscan::Status status=:open, protocol=:tcp, port=443, reason=[:syn, :ack], ttl=54, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-26 16:07:33 -0700, mac=nil>
|
59
|
+
#<struct Masscan::Status status=:open, protocol=:icmp, port=0, reason=[], ttl=54, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-26 16:07:33 -0700, mac=nil>
|
60
|
+
#<struct Masscan::Banner protocol=:tcp, port=443, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-26 16:07:35 -0700, app_protocol=:ssl3, payload="TLS/1.1 cipher:0xc013, www.example.org, www.example.org, example.com, example.edu, example.net, example.org, www.example.com, www.example.edu, www.example.net">
|
61
|
+
#<struct Masscan::Banner protocol=:tcp, port=443, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-26 16:07:35 -0700, app_protocol=:x509_cert, payload="MIIG1TCCBb2gAwIBAgIQD74IsIVNBXOKsMzhya/uyTANBgkqhkiG9w0BAQsFADBPMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMSkwJwYDVQQDEyBEaWdpQ2VydCBUTFMgUlNBIFNIQTI1NiAyMDIwIENBMTAeFw0yMDExMjQwMDAwMDBaFw0yMTEyMjUyMzU5NTlaMIGQMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEUMBIGA1UEBxMLTG9zIEFuZ2VsZXMxPDA6BgNVBAoTM0ludGVybmV0IENvcnBvcmF0aW9uIGZvciBBc3NpZ25lZCBOYW1lcyBhbmQgTnVtYmVyczEYMBYGA1UEAxMPd3d3LmV4YW1wbGUub3JnMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuvzuzMoKCP8Okx2zvgucA5YinrFPEK5RQP1TX7PEYUAoBO6i5hIAsIKFmFxtW2sghERilU5rdnxQcF3fEx3sY4OtY6VSBPLPhLrbKozHLrQ8ZN/rYTb+hgNUeT7NA1mP78IEkxAj4qG5tli4Jq41aCbUlCt7equGXokImhC+UY5IpQEZS0tKD4vu2ksZ04Qetp0k8jWdAvMA27W3EwgHHNeVGWbJPC0Dn7RqPw13r7hFyS5TpleywjdY1nB7ad6kcZXZbEcaFZ7ZuerA6RkPGE+PsnZRb1oFJkYoXimsuvkVFhWeHQXCGC1cuDWSrM3cpQvOzKH2vS7d15+zGls4IwIDAQABo4IDaTCCA2UwHwYDVR0jBBgwFoAUt2ui6qiqhIx56rTaD5iyxZV2ufQwHQYDVR0OBBYEFCYa+OSxsHKEztqBBtInmPvtOj0XMIGBBgNVHREEejB4gg93d3cuZXhhbXBsZS5vcmeCC2V4YW1wbGUuY29tggtleGFtcGxlLmVkdYILZXhhbXBsZS5uZXSCC2V4YW1wbGUub3Jngg93d3cuZXhhbXBsZS5jb22CD3d3dy5leGFtcGxlLmVkdYIPd3d3LmV4YW1wbGUubmV0MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwgYsGA1UdHwSBgzCBgDA+oDygOoY4aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VExTUlNBU0hBMjU2MjAyMENBMS5jcmwwPqA8oDqGOGh0dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNv">
|
62
|
+
#<struct Masscan::Banner protocol=:tcp, port=80, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-26 16:07:35 -0700, app_protocol=:http_server, payload="ECS (sec/97A6)">
|
63
|
+
#<struct Masscan::Banner protocol=:tcp, port=80, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-26 16:07:35 -0700, app_protocol=:html_title, payload="404 - Not Found">
|
64
|
+
#<struct Masscan::Banner protocol=:tcp, port=80, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-26 16:07:35 -0700, app_protocol=:http, payload="HTTP/1.0 404 Not Found\r\nContent-Type: text/html\r\nDate: Thu, 26 Aug 2021 23:07:35 GMT\r\nServer: ECS (sec/97A6)\r\nContent-Length: 345\r\nConnection: close\r\n\r">
|
65
|
+
```
|
66
|
+
|
67
|
+
Parse `masscan` simple list output files:
|
68
|
+
|
69
|
+
```ruby
|
70
|
+
output_file = Masscan::OutputFile.new('masscan.txt', format: :list)
|
71
|
+
output_file.each do |record|
|
72
|
+
p record
|
73
|
+
end
|
74
|
+
```
|
75
|
+
|
76
|
+
```
|
77
|
+
#<struct Masscan::Status status=:open, protocol=:tcp, port=443, reason=nil, ttl=nil, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:47:50 -0700, mac=nil>
|
78
|
+
#<struct Masscan::Status status=:open, protocol=:tcp, port=80, reason=nil, ttl=nil, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:47:50 -0700, mac=nil>
|
79
|
+
#<struct Masscan::Status status=:open, protocol=:icmp, port=0, reason=nil, ttl=nil, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:47:50 -0700, mac=nil>
|
80
|
+
#<struct Masscan::Banner protocol=:tcp, port=443, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:47:52 -0700, app_protocol=:ssl3, payload="TLS/1.1 cipher:0xc013, www.example.org, www.example.org, example.com, example.edu, example.net, example.org, www.example.com, www.example.edu, www.example.net">
|
81
|
+
#<struct Masscan::Banner protocol=:tcp, port=443, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:47:52 -0700, app_protocol=:x509, payload="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">
|
82
|
+
#<struct Masscan::Banner protocol=:tcp, port=80, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:47:52 -0700, app_protocol=:http_server, payload="ECS (sec/974D)">
|
83
|
+
#<struct Masscan::Banner protocol=:tcp, port=80, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:47:52 -0700, app_protocol=:html_title, payload="404 - Not Found">
|
84
|
+
#<struct Masscan::Banner protocol=:tcp, port=80, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:47:52 -0700, app_protocol=:http, payload="HTTP/1.0 404 Not Found\\x0d\\x0aContent-Type: text/html\\x0d\\x0aDate: Thu, 26 Aug 2021 06:47:52 GMT\\x0d\\x0aServer: ECS (sec/974D)\\x0d\\x0aContent-Length: 345\\x0d\\x0aConnection: close\\x0d\\x0a\\x0d">
|
85
|
+
```
|
86
|
+
|
87
|
+
Parse `masscan` JSON output files:
|
88
|
+
|
89
|
+
```ruby
|
90
|
+
output_file = Masscan::OutputFile.new('masscan.json', format: :json)
|
91
|
+
output_file.each do |record|
|
92
|
+
p record
|
93
|
+
end
|
94
|
+
```
|
95
|
+
|
96
|
+
```
|
97
|
+
#<struct Masscan::Status status=:open, protocol=:tcp, port=80, reason=[:syn, :ack], ttl=54, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:50:21 -0700, mac=nil>
|
98
|
+
#<struct Masscan::Status status=:open, protocol=:tcp, port=443, reason=[:syn, :ack], ttl=54, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:50:21 -0700, mac=nil>
|
99
|
+
#<struct Masscan::Status status=:open, protocol=:icmp, port=0, reason=["none"], ttl=54, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:50:22 -0700, mac=nil>
|
100
|
+
#<struct Masscan::Banner protocol=:tcp, port=80, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:50:24 -0700, app_protocol=:http_server, payload="ECS (sec/974D)">
|
101
|
+
#<struct Masscan::Banner protocol=:tcp, port=80, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:50:24 -0700, app_protocol=:html_title, payload="404 - Not Found">
|
102
|
+
#<struct Masscan::Banner protocol=:tcp, port=80, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:50:24 -0700, app_protocol=:http, payload="HTTP/1.0 404 Not Found\r\nContent-Type: text/html\r\nDate: Thu, 26 Aug 2021 06:50:24 GMT\r\nServer: ECS (sec/974D)\r\nContent-Length: 345\r\nConnection: close\r\n\r">
|
103
|
+
#<struct Masscan::Banner protocol=:tcp, port=443, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:50:33 -0700, app_protocol=:ssl3, payload="TLS/1.1 cipher:0xc013, www.example.org, www.example.org, example.com, example.edu, example.net, example.org, www.example.com, www.example.edu, www.example.net">
|
104
|
+
#<struct Masscan::Banner protocol=:tcp, port=443, ip=#<IPAddr: IPv4:93.184.216.34/255.255.255.255>, timestamp=2021-08-25 23:50:33 -0700, app_protocol=:x509, payload="MIIG1TCCBb2gAwIBAgIQD74IsIVNBXOKsMzhya/uyTANBgkqhkiG9w0BAQsFADBPMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMSkwJwYDVQQDEyBEaWdpQ2VydCBUTFMgUlNBIFNIQTI1NiAyMDIwIENBMTAeFw0yMDExMjQwMDAwMDBaFw0yMTEyMjUyMzU5NTlaMIGQMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEUMBIGA1UEBxMLTG9zIEFuZ2VsZXMxPDA6BgNVBAoTM0ludGVybmV0IENvcnBvcmF0aW9uIGZvciBBc3NpZ25lZCBOYW1lcyBhbmQgTnVtYmVyczEYMBYGA1UEAxMPd3d3LmV4YW1wbGUub3JnMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuvzuzMoKCP8Okx2zvgucA5YinrFPEK5RQP1TX7PEYUAoBO6i5hIAsIKFmFxtW2sghERilU5rdnxQcF3fEx3sY4OtY6VSBPLPhLrbKozHLrQ8ZN/rYTb+hgNUeT7NA1mP78IEkxAj4qG5tli4Jq41aCbUlCt7equGXokImhC+UY5IpQEZS0tKD4vu2ksZ04Qetp0k8jWdAvMA27W3EwgHHNeVGWbJPC0Dn7RqPw13r7hFyS5TpleywjdY1nB7ad6kcZXZbEcaFZ7ZuerA6RkPGE+PsnZRb1oFJkYoXimsuvkVFhWeHQXCGC1cuDWSrM3cpQvOzKH2vS7d15+zGls4IwIDAQABo4IDaTCCA2UwHwYDVR0jBBgwFoAUt2ui6qiqhIx56rTaD5iyxZV2ufQwHQYDVR0OBBYEFCYa+OSxsHKEztqBBtInmPvtOj0XMIGBBgNVHREEejB4gg93d3cuZXhhbXBsZS5vcmeCC2V4YW1wbGUuY29tggtleGFtcGxlLmVkdYILZXhhbXBsZS5uZXSCC2V4YW1wbGUub3Jngg93d3cuZXhhbXBsZS5jb22CD3d3dy5leGFtcGxlLmVkdYIPd3d3LmV4YW1wbGUubmV0MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwgYsGA1UdHwSBgzCBgDA+oDygOoY4aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VExTUlNBU0hBMjU2MjAyMENBMS5jcmwwPqA8oDqGOGh0dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNv">
|
105
|
+
```
|
106
|
+
|
107
|
+
## Requirements
|
108
|
+
|
109
|
+
* [ruby] >= 2.0.0
|
110
|
+
* [masscan] >= 1.0.0
|
111
|
+
* [rprogram] ~> 0.3
|
112
|
+
|
113
|
+
## Install
|
114
|
+
|
115
|
+
```shell
|
116
|
+
$ gem install ruby-masscan
|
117
|
+
```
|
118
|
+
|
119
|
+
### gemspec
|
120
|
+
|
121
|
+
```ruby
|
122
|
+
gemspec.add_dependency 'ruby-masscan', '~> 0.1'
|
123
|
+
```
|
124
|
+
|
125
|
+
### Gemfile
|
126
|
+
|
127
|
+
```ruby
|
128
|
+
gem 'ruby-masscan', '~> 0.1'
|
129
|
+
```
|
130
|
+
|
131
|
+
## License
|
132
|
+
|
133
|
+
Copyright (c) 2021 Hal Brodigan
|
134
|
+
|
135
|
+
See {file:LICENSE.txt} for license information.
|
136
|
+
|
137
|
+
[masscan]: https://github.com/robertdavidgraham/masscan#readme
|
138
|
+
[ruby]: https://www.ruby-lang.org/
|
139
|
+
[rprogram]: https://github.com/postmodern/rprogram#readme
|
data/Rakefile
ADDED
@@ -0,0 +1,23 @@
|
|
1
|
+
# encoding: utf-8
|
2
|
+
|
3
|
+
require 'rubygems'
|
4
|
+
|
5
|
+
begin
|
6
|
+
require 'bundler/setup'
|
7
|
+
rescue LoadError => e
|
8
|
+
warn e.message
|
9
|
+
warn "Run `gem install bundler` to install Bundler"
|
10
|
+
exit -1
|
11
|
+
end
|
12
|
+
|
13
|
+
require 'rubygems/tasks'
|
14
|
+
Gem::Tasks.new
|
15
|
+
|
16
|
+
require 'rspec/core/rake_task'
|
17
|
+
RSpec::Core::RakeTask.new
|
18
|
+
task :test => :spec
|
19
|
+
task :default => :spec
|
20
|
+
|
21
|
+
require 'yard'
|
22
|
+
YARD::Rake::YardocTask.new
|
23
|
+
task :doc => :yard
|
data/gemspec.yml
ADDED
@@ -0,0 +1,28 @@
|
|
1
|
+
name: ruby-masscan
|
2
|
+
summary: A Ruby interface to masscan.
|
3
|
+
description:
|
4
|
+
A Ruby interface to masscan, an Internet-scale port scanner.
|
5
|
+
Allows automating masscan and parsing masscan Binary, List, JSON, and output
|
6
|
+
file formats.
|
7
|
+
|
8
|
+
license: MIT
|
9
|
+
authors: Postmodern
|
10
|
+
email: postmodern.mod3@gmail.com
|
11
|
+
homepage: https://github.com/postmodern/ruby-masscan#readme
|
12
|
+
has_yard: true
|
13
|
+
|
14
|
+
metadata:
|
15
|
+
documentation_uri: https://rubydoc.info/gems/ruby-masscan
|
16
|
+
source_code_uri: https://github.com/postmodern/ruby-masscan
|
17
|
+
bug_tracker_uri: https://github.com/postmodern/ruby-masscan/issues
|
18
|
+
changelog_uri: https://github.com/postmodern/ruby-masscan/blob/master/ChangeLog.md
|
19
|
+
|
20
|
+
required_ruby_version: ">= 2.0.0"
|
21
|
+
|
22
|
+
requirements: masscan >= 1.0.0
|
23
|
+
|
24
|
+
dependencies:
|
25
|
+
rprogram: ~> 0.3
|
26
|
+
|
27
|
+
development_dependencies:
|
28
|
+
bundler: ~> 2.0
|
@@ -0,0 +1,100 @@
|
|
1
|
+
require 'masscan/parsers/list'
|
2
|
+
require 'masscan/parsers/json'
|
3
|
+
require 'masscan/parsers/binary'
|
4
|
+
|
5
|
+
module Masscan
|
6
|
+
#
|
7
|
+
# Represents an output file.
|
8
|
+
#
|
9
|
+
class OutputFile
|
10
|
+
|
11
|
+
PARSERS = {
|
12
|
+
binary: Parsers::Binary,
|
13
|
+
list: Parsers::List,
|
14
|
+
json: Parsers::JSON,
|
15
|
+
ndjson: Parsers::JSON,
|
16
|
+
# xml: Parsers::XML,
|
17
|
+
}
|
18
|
+
|
19
|
+
# The path to the output file.
|
20
|
+
#
|
21
|
+
# @return [String]
|
22
|
+
attr_reader :path
|
23
|
+
|
24
|
+
# The format of the output file.
|
25
|
+
#
|
26
|
+
# @return [Symbol]
|
27
|
+
attr_reader :format
|
28
|
+
|
29
|
+
# The parser for the output file format.
|
30
|
+
#
|
31
|
+
# @return [Parsers::Binary, Parsers::JSON, Parsers::List]
|
32
|
+
attr_reader :parser
|
33
|
+
|
34
|
+
#
|
35
|
+
# Initializes the output file.
|
36
|
+
#
|
37
|
+
# @param [String] path
|
38
|
+
# The path to the output file.
|
39
|
+
#
|
40
|
+
# @param [:binary, :list, :json, :ndjson] format
|
41
|
+
# The format of the output file. Defaults to {infer_format}.
|
42
|
+
#
|
43
|
+
# @raise [ArgumentError]
|
44
|
+
# The output format was not given and it cannot be inferred.
|
45
|
+
#
|
46
|
+
def initialize(path, format: self.class.infer_format(path))
|
47
|
+
@path = path
|
48
|
+
@format = format
|
49
|
+
|
50
|
+
@parser = PARSERS.fetch(format) do
|
51
|
+
raise(ArgumentError,"unknown format: #{format.inspect}")
|
52
|
+
end
|
53
|
+
end
|
54
|
+
|
55
|
+
#
|
56
|
+
# Infers the format from the output file's extension name.
|
57
|
+
#
|
58
|
+
# @param [String] path
|
59
|
+
# The path to the output file.
|
60
|
+
#
|
61
|
+
# @return [:binary, :list, :json, :ndjson]
|
62
|
+
# The output format inferred from the file's extension name.
|
63
|
+
#
|
64
|
+
# @raise [ArgumentError]
|
65
|
+
# The output format could not be inferred from the file's name.
|
66
|
+
#
|
67
|
+
def self.infer_format(path)
|
68
|
+
case File.extname(path)
|
69
|
+
when '.bin', '.dat' then :binary
|
70
|
+
when '.txt', '.list' then :list
|
71
|
+
when '.json' then :json
|
72
|
+
when '.ndjson' then :ndjson
|
73
|
+
when '.xml' then :xml
|
74
|
+
else
|
75
|
+
raise(ArgumentError,"could not infer format of #{path}")
|
76
|
+
end
|
77
|
+
end
|
78
|
+
|
79
|
+
#
|
80
|
+
# Parses the contents of the output file.
|
81
|
+
#
|
82
|
+
# @yield [record]
|
83
|
+
# If a block is given, it will be passed each parsed record.
|
84
|
+
#
|
85
|
+
# @yield [Status, Banner] record
|
86
|
+
# A parsed record, either a {Status} or a {Banner}.
|
87
|
+
#
|
88
|
+
# @return [Enumerator]
|
89
|
+
# If no block is given, an Enumerator will be returned.
|
90
|
+
#
|
91
|
+
def each(&block)
|
92
|
+
return enum_for(__method__) unless block
|
93
|
+
|
94
|
+
@parser.open(@path) do |file|
|
95
|
+
@parser.parse(file,&block)
|
96
|
+
end
|
97
|
+
end
|
98
|
+
|
99
|
+
end
|
100
|
+
end
|
@@ -0,0 +1,591 @@
|
|
1
|
+
require 'masscan/status'
|
2
|
+
require 'masscan/banner'
|
3
|
+
|
4
|
+
require 'socket'
|
5
|
+
|
6
|
+
module Masscan
|
7
|
+
module Parsers
|
8
|
+
#
|
9
|
+
# Parses the `masscan -oB` output format.
|
10
|
+
#
|
11
|
+
# @note Ported from https://github.com/robertdavidgraham/masscan/blob/1.3.2/src/in-binary.c
|
12
|
+
#
|
13
|
+
# @api semipublic
|
14
|
+
#
|
15
|
+
module Binary
|
16
|
+
#
|
17
|
+
# Opens a binary file for parsing.
|
18
|
+
#
|
19
|
+
# @param [String] path
|
20
|
+
# The path to the file.
|
21
|
+
#
|
22
|
+
# @yield [file]
|
23
|
+
# If a block is given, it will be passed the opened file.
|
24
|
+
# Once the block returns, the file will be closed.
|
25
|
+
#
|
26
|
+
# @yieldparam [File]
|
27
|
+
# The opened file.
|
28
|
+
#
|
29
|
+
# @return [File]
|
30
|
+
# If no block was given, the opened file will be returned.
|
31
|
+
#
|
32
|
+
def self.open(path,&block)
|
33
|
+
File.open(path,'rb',&block)
|
34
|
+
end
|
35
|
+
|
36
|
+
class CorruptedFile < RuntimeError
|
37
|
+
end
|
38
|
+
|
39
|
+
# Maximum buffer length for a single record.
|
40
|
+
BUF_MAX = 1024 * 1024
|
41
|
+
|
42
|
+
#
|
43
|
+
# Parses masscan binary data.
|
44
|
+
#
|
45
|
+
# @param [IO] io
|
46
|
+
# The IO object to read from.
|
47
|
+
#
|
48
|
+
# @yield [record]
|
49
|
+
# If a block is given, it will be passed each parsed record.
|
50
|
+
#
|
51
|
+
# @yieldparam [Status, Banner] record
|
52
|
+
# A parsed record, either a {Status} or a {Banner} object.
|
53
|
+
#
|
54
|
+
# @return [Enumerator]
|
55
|
+
# If no block is given, it will return an Enumerator.
|
56
|
+
#
|
57
|
+
def self.parse(io)
|
58
|
+
return enum_for(__method__,io) unless block_given?
|
59
|
+
|
60
|
+
pseudo = read_pseudo_record(io)
|
61
|
+
|
62
|
+
# look for the start time
|
63
|
+
if (match = pseudo.match(/s:(\d+)/))
|
64
|
+
start_time = decode_timestamp(match[1].to_i)
|
65
|
+
end
|
66
|
+
|
67
|
+
total_records = 0
|
68
|
+
|
69
|
+
# read all records
|
70
|
+
loop do
|
71
|
+
# read the TYPE field
|
72
|
+
unless (type = read_multibyte_uint(io))
|
73
|
+
return
|
74
|
+
end
|
75
|
+
|
76
|
+
# read the LENGTH field
|
77
|
+
unless (length = read_multibyte_uint(io))
|
78
|
+
return
|
79
|
+
end
|
80
|
+
|
81
|
+
if length > BUF_MAX
|
82
|
+
raise(CorruptedFile,"file corrupted")
|
83
|
+
end
|
84
|
+
|
85
|
+
# read the remainder of the record
|
86
|
+
buffer = io.read(length)
|
87
|
+
|
88
|
+
if buffer.length < length
|
89
|
+
return
|
90
|
+
end
|
91
|
+
|
92
|
+
# parse the specific record type
|
93
|
+
record = case type
|
94
|
+
when 1 # STATUS: open
|
95
|
+
parse_status(buffer,:open)
|
96
|
+
when 2 # STATUS: closed
|
97
|
+
parse_status(buffer,:closed)
|
98
|
+
when 3 # BANNER
|
99
|
+
parse_banner3(buffer)
|
100
|
+
when 4
|
101
|
+
io.getbyte
|
102
|
+
parse_banner4(buffer)
|
103
|
+
when 5
|
104
|
+
parse_banner4(buffer)
|
105
|
+
when 6 # STATUS: open
|
106
|
+
parse_status2(buffer,:open)
|
107
|
+
when 7 # STATUS: closed
|
108
|
+
parse_status2(buffer,:closed)
|
109
|
+
when 9
|
110
|
+
parse_banner9(buffer)
|
111
|
+
when 10 # Open6
|
112
|
+
parse_status6(buffer,:open)
|
113
|
+
when 11 # Closed6
|
114
|
+
parse_status6(buffer,:closed)
|
115
|
+
when 13 # Banner6
|
116
|
+
parse_banner6(buffer)
|
117
|
+
when 109 # 'm'.ord # FILEHEADER
|
118
|
+
next
|
119
|
+
else
|
120
|
+
raise(CorruptedFile,"unknown type: #{type.inspect}")
|
121
|
+
end
|
122
|
+
|
123
|
+
if record
|
124
|
+
start_time ||= record.timestamp
|
125
|
+
|
126
|
+
yield record
|
127
|
+
|
128
|
+
total_records += 1
|
129
|
+
end
|
130
|
+
end
|
131
|
+
|
132
|
+
return total_records
|
133
|
+
end
|
134
|
+
|
135
|
+
# The "pseudo record" length
|
136
|
+
PSEUDO_RECORD_SIZE = 99 # 'a'.ord + 2
|
137
|
+
|
138
|
+
# Masscan binary format version compatibility.
|
139
|
+
MASSCAN_VERSION_FAMILY = "1.1"
|
140
|
+
|
141
|
+
# The `masscan` binary format magic string.
|
142
|
+
MASSCAN_MAGIC = "masscan/#{MASSCAN_VERSION_FAMILY}"
|
143
|
+
|
144
|
+
#
|
145
|
+
# Reads the "pseudo record" at the beginning of the file.
|
146
|
+
#
|
147
|
+
# @param [IO] io
|
148
|
+
# The IO object to read from.
|
149
|
+
#
|
150
|
+
# @return [String]
|
151
|
+
# The read buffer.
|
152
|
+
#
|
153
|
+
def self.read_pseudo_record(io)
|
154
|
+
buffer = io.read(PSEUDO_RECORD_SIZE)
|
155
|
+
|
156
|
+
if buffer.length < PSEUDO_RECORD_SIZE
|
157
|
+
raise(CorruptedFile,"invalid masscan binary format")
|
158
|
+
end
|
159
|
+
|
160
|
+
unless buffer.start_with?(MASSCAN_MAGIC)
|
161
|
+
raise(CorruptedFile,"unknown file format (expected #{MASSCAN_MAGIC})")
|
162
|
+
end
|
163
|
+
|
164
|
+
return buffer
|
165
|
+
end
|
166
|
+
|
167
|
+
#
|
168
|
+
# Reads a multi-byte unsigned integer.
|
169
|
+
#
|
170
|
+
# @param [IO] io
|
171
|
+
# The IO object to read from.
|
172
|
+
#
|
173
|
+
# @return [Integer, nil]
|
174
|
+
# The unsigned integer, or `nil` if End-of-Stream was reached.
|
175
|
+
#
|
176
|
+
def self.read_multibyte_uint(io)
|
177
|
+
unless (b = io.getbyte)
|
178
|
+
return
|
179
|
+
end
|
180
|
+
|
181
|
+
type = b & 0x7f
|
182
|
+
|
183
|
+
while (b & 0x80) != 0
|
184
|
+
unless (b = io.getbyte)
|
185
|
+
return
|
186
|
+
end
|
187
|
+
|
188
|
+
type = (type << 7) | (b & 0x7f)
|
189
|
+
end
|
190
|
+
|
191
|
+
return type
|
192
|
+
end
|
193
|
+
|
194
|
+
#
|
195
|
+
# Decodes a timestamp from an integer.
|
196
|
+
#
|
197
|
+
# @param [Integer] timestamp
|
198
|
+
# The raw UNIX timestamp integer.
|
199
|
+
#
|
200
|
+
# @return [Time]
|
201
|
+
# The decoded time value.
|
202
|
+
#
|
203
|
+
def self.decode_timestamp(timestamp)
|
204
|
+
Time.at(timestamp)
|
205
|
+
end
|
206
|
+
|
207
|
+
#
|
208
|
+
# Decodes an IPv4 address from an integer.
|
209
|
+
#
|
210
|
+
# @param [Integer] ip
|
211
|
+
# The IP in raw integer form.
|
212
|
+
#
|
213
|
+
# @return [IPAddr]
|
214
|
+
# The decoded IPv4 address.
|
215
|
+
#
|
216
|
+
def self.decode_ipv4(ip)
|
217
|
+
IPAddr.new(ip,Socket::AF_INET)
|
218
|
+
end
|
219
|
+
|
220
|
+
#
|
221
|
+
# Decodes an IPv6 address from two 64bit integers.
|
222
|
+
#
|
223
|
+
# @param [Integer] ipv6_hi
|
224
|
+
# The top-half of the 128bit IPv6 address.
|
225
|
+
#
|
226
|
+
# @param [Integer] ipv6_lo
|
227
|
+
# The top-half of the 128bit IPv6 address.
|
228
|
+
#
|
229
|
+
# @return [IPAddr]
|
230
|
+
# The decoded IPv6 address.
|
231
|
+
#
|
232
|
+
def self.decode_ipv6(ipv6_hi,ipv6_lo)
|
233
|
+
IPAddr.new((ipv6_hi << 64) | ipv6_lo,Socket::AF_INET6)
|
234
|
+
end
|
235
|
+
|
236
|
+
# Mapping of IP protocol numbers to keywords.
|
237
|
+
IP_PROTOCOLS = {
|
238
|
+
Socket::IPPROTO_ICMP => :icmp,
|
239
|
+
Socket::IPPROTO_ICMPV6 => :icmp,
|
240
|
+
|
241
|
+
Socket::IPPROTO_TCP => :tcp,
|
242
|
+
Socket::IPPROTO_UDP => :udp,
|
243
|
+
|
244
|
+
132 => :sctp # Socket::IPPROTO_SCTP might not always be defined
|
245
|
+
}
|
246
|
+
|
247
|
+
#
|
248
|
+
# Looks up an IP protocol number.
|
249
|
+
#
|
250
|
+
# @param [Integer] proto
|
251
|
+
# The IP protocol number.
|
252
|
+
#
|
253
|
+
# @return [:icmp, :tcp, :udp, :sctp, nil]
|
254
|
+
# The IP protocol keyword.
|
255
|
+
#
|
256
|
+
# @see IP_PROTOCOLS
|
257
|
+
#
|
258
|
+
def self.lookup_ip_protocol(proto)
|
259
|
+
IP_PROTOCOLS[proto]
|
260
|
+
end
|
261
|
+
|
262
|
+
#
|
263
|
+
# Decodes a reason bitflag.
|
264
|
+
#
|
265
|
+
# @param [Integer] reason
|
266
|
+
# The reason bitflag.
|
267
|
+
#
|
268
|
+
# @return [Array<:fin, :syn, :rst, :psh, :ack, :urg, :ece, :cwr>]
|
269
|
+
# The reason flags.
|
270
|
+
#
|
271
|
+
def self.decode_reason(reason)
|
272
|
+
flags = []
|
273
|
+
flags << :fin if (reason & 0x01) != 0
|
274
|
+
flags << :syn if (reason & 0x02) != 0
|
275
|
+
flags << :rst if (reason & 0x04) != 0
|
276
|
+
flags << :psh if (reason & 0x08) != 0
|
277
|
+
flags << :ack if (reason & 0x10) != 0
|
278
|
+
flags << :urg if (reason & 0x20) != 0
|
279
|
+
flags << :ece if (reason & 0x40) != 0
|
280
|
+
flags << :cwr if (reason & 0x80) != 0
|
281
|
+
flags
|
282
|
+
end
|
283
|
+
|
284
|
+
# List of application protocol keywords.
|
285
|
+
APP_PROTOCOLS = [
|
286
|
+
nil,
|
287
|
+
:heur,
|
288
|
+
:ssh1,
|
289
|
+
:ssh2,
|
290
|
+
:http,
|
291
|
+
:ftp,
|
292
|
+
:dns_versionbind,
|
293
|
+
:snmp, # simple network management protocol, udp/161
|
294
|
+
:nbtstat, # netbios, udp/137
|
295
|
+
:ssl3,
|
296
|
+
:smb, # SMB tcp/139 and tcp/445
|
297
|
+
:smtp,
|
298
|
+
:pop3,
|
299
|
+
:imap4,
|
300
|
+
:udp_zeroaccess,
|
301
|
+
:x509_cert,
|
302
|
+
:html_title,
|
303
|
+
:html_full,
|
304
|
+
:ntp, # network time protocol, udp/123
|
305
|
+
:vuln,
|
306
|
+
:heartbleed,
|
307
|
+
:ticketbleed,
|
308
|
+
:vnc_rfb,
|
309
|
+
:safe,
|
310
|
+
:memcached,
|
311
|
+
:scripting,
|
312
|
+
:versioning,
|
313
|
+
:coap, # constrained app proto, udp/5683, RFC7252
|
314
|
+
:telnet,
|
315
|
+
:rdp, # Microsoft Remote Desktop Protocol tcp/3389
|
316
|
+
:http_server, # HTTP "Server:" field
|
317
|
+
]
|
318
|
+
|
319
|
+
#
|
320
|
+
# Looks up an application protocol number.
|
321
|
+
#
|
322
|
+
# @param [Integer] proto
|
323
|
+
# The application protocol number.
|
324
|
+
#
|
325
|
+
# @return [Symbol, nil]
|
326
|
+
# The application protocol keyword.
|
327
|
+
#
|
328
|
+
# @see APP_PROTOCOLS
|
329
|
+
#
|
330
|
+
def self.lookup_app_protocol(proto)
|
331
|
+
APP_PROTOCOLS[proto]
|
332
|
+
end
|
333
|
+
|
334
|
+
#
|
335
|
+
# Parses a status record.
|
336
|
+
#
|
337
|
+
# @param [String] buffer
|
338
|
+
# The buffer to parse.
|
339
|
+
#
|
340
|
+
# @param [:open, :closed] status
|
341
|
+
# Indicates whether the port status is open or closed.
|
342
|
+
#
|
343
|
+
# @return [Status]
|
344
|
+
# The parsed status record.
|
345
|
+
#
|
346
|
+
def self.parse_status(buffer,status)
|
347
|
+
if buffer.length < 12
|
348
|
+
return
|
349
|
+
end
|
350
|
+
|
351
|
+
timestamp, ip, port, reason, ttl = buffer.unpack("L>L>S>CC")
|
352
|
+
|
353
|
+
timestamp = decode_timestamp(timestamp)
|
354
|
+
ip = decode_ipv4(ip)
|
355
|
+
reason = decode_reason(reason)
|
356
|
+
|
357
|
+
# if ARP, there will be a MAC address after the record
|
358
|
+
mac = if ip == 0 && buffer.length >= 12+6
|
359
|
+
buffer[12+6,6]
|
360
|
+
end
|
361
|
+
|
362
|
+
protocol = case port
|
363
|
+
when 53, 123, 137, 161 then :udp
|
364
|
+
when 36422, 36412, 2905 then :sctp
|
365
|
+
else :tcp
|
366
|
+
end
|
367
|
+
|
368
|
+
return Status.new(
|
369
|
+
status,
|
370
|
+
protocol,
|
371
|
+
port,
|
372
|
+
ip,
|
373
|
+
timestamp,
|
374
|
+
mac
|
375
|
+
)
|
376
|
+
end
|
377
|
+
|
378
|
+
#
|
379
|
+
# Parses a banner record.
|
380
|
+
#
|
381
|
+
# @param [String] buffer
|
382
|
+
# The buffer to parse.
|
383
|
+
#
|
384
|
+
# @return [Buffer]
|
385
|
+
# The parsed buffer record.
|
386
|
+
#
|
387
|
+
def self.parse_banner3(buffer)
|
388
|
+
timestamp, ip, port, app_proto, payload = buffer.unpack('L>L>S>S>A*')
|
389
|
+
|
390
|
+
timestamp = decode_timestamp(timestamp)
|
391
|
+
ip = decode_ipv4(ip)
|
392
|
+
app_proto = lookup_app_protocol(app_proto)
|
393
|
+
|
394
|
+
# defaults
|
395
|
+
ip_proto = :tcp
|
396
|
+
ttl = 0
|
397
|
+
|
398
|
+
return Banner.new(
|
399
|
+
ip_proto,
|
400
|
+
port,
|
401
|
+
ip,
|
402
|
+
timestamp,
|
403
|
+
app_proto,
|
404
|
+
payload
|
405
|
+
)
|
406
|
+
end
|
407
|
+
|
408
|
+
#
|
409
|
+
# Parses a banner record.
|
410
|
+
#
|
411
|
+
# @param [String] buffer
|
412
|
+
# The buffer to parse.
|
413
|
+
#
|
414
|
+
# @return [Buffer]
|
415
|
+
# The parsed buffer record.
|
416
|
+
#
|
417
|
+
def self.parse_banner4(buffer)
|
418
|
+
if buffer.length < 13
|
419
|
+
return
|
420
|
+
end
|
421
|
+
|
422
|
+
timestamp, ip, ip_prot, port, app_proto, payload = buffer.unpack('L>L>CS>S>A*')
|
423
|
+
|
424
|
+
timestamp = decode_timestamp(timestamp)
|
425
|
+
ip = decode_ipv4(ip)
|
426
|
+
ip_proto = lookup_ip_protocol(ip_proto)
|
427
|
+
app_proto = lookup_app_protocol(app_proto)
|
428
|
+
|
429
|
+
# defaults
|
430
|
+
ttl = 0
|
431
|
+
|
432
|
+
return Banner.new(
|
433
|
+
ip_proto,
|
434
|
+
port,
|
435
|
+
ip,
|
436
|
+
timestamp,
|
437
|
+
app_proto,
|
438
|
+
payload
|
439
|
+
)
|
440
|
+
end
|
441
|
+
|
442
|
+
#
|
443
|
+
# Parses a status record.
|
444
|
+
#
|
445
|
+
# @param [String] buffer
|
446
|
+
# The buffer to parse.
|
447
|
+
#
|
448
|
+
# @param [:open, :closed] status
|
449
|
+
# Indicates whether the port status is open or closed.
|
450
|
+
#
|
451
|
+
# @return [Status]
|
452
|
+
# The parsed status record.
|
453
|
+
#
|
454
|
+
def self.parse_status2(buffer,status)
|
455
|
+
if buffer.length < 13
|
456
|
+
return
|
457
|
+
end
|
458
|
+
|
459
|
+
timestamp, ip, ip_proto, port, reason, ttl = buffer.unpack('L>L>CS>CC')
|
460
|
+
timestamp = decode_timestamp(timestamp)
|
461
|
+
ip = decode_ipv4(ip)
|
462
|
+
ip_proto = lookup_ip_protocol(ip_proto)
|
463
|
+
reason = decode_reason(reason)
|
464
|
+
|
465
|
+
mac = if ip == 0 && buffer.length >= 13+6
|
466
|
+
buffer[13,6]
|
467
|
+
end
|
468
|
+
|
469
|
+
return Status.new(
|
470
|
+
status,
|
471
|
+
ip_proto,
|
472
|
+
port,
|
473
|
+
reason,
|
474
|
+
ttl,
|
475
|
+
ip,
|
476
|
+
timestamp,
|
477
|
+
mac
|
478
|
+
)
|
479
|
+
end
|
480
|
+
|
481
|
+
#
|
482
|
+
# Parses a banner record.
|
483
|
+
#
|
484
|
+
# @param [String] buffer
|
485
|
+
# The buffer to parse.
|
486
|
+
#
|
487
|
+
# @return [Buffer]
|
488
|
+
# The parsed buffer record.
|
489
|
+
#
|
490
|
+
def self.parse_banner9(buffer)
|
491
|
+
if buffer.length < 14
|
492
|
+
return
|
493
|
+
end
|
494
|
+
|
495
|
+
timestamp, ip, ip_proto, port, app_proto, ttl, payload = buffer.unpack('L>L>CS>S>CA*')
|
496
|
+
timestamp = decode_timestamp(timestamp)
|
497
|
+
ip = decode_ipv4(ip)
|
498
|
+
ip_proto = lookup_ip_protocol(ip_proto)
|
499
|
+
app_proto = lookup_app_protocol(app_proto)
|
500
|
+
|
501
|
+
return Banner.new(
|
502
|
+
ip_proto,
|
503
|
+
port,
|
504
|
+
ip,
|
505
|
+
timestamp,
|
506
|
+
app_proto,
|
507
|
+
payload
|
508
|
+
)
|
509
|
+
end
|
510
|
+
|
511
|
+
#
|
512
|
+
# Parses a status record.
|
513
|
+
#
|
514
|
+
# @param [String] buffer
|
515
|
+
# The buffer to parse.
|
516
|
+
#
|
517
|
+
# @param [:open, :closed] status
|
518
|
+
# Indicates whether the port status is open or closed.
|
519
|
+
#
|
520
|
+
# @return [Status]
|
521
|
+
# The parsed status record.
|
522
|
+
#
|
523
|
+
def self.parse_status6(buffer,status)
|
524
|
+
timestamp, ip_proto, port, reason, ttl, ip_version, ipv6_hi, ipv6_lo = buffer.unpack('L>CS>CCCQ>Q>')
|
525
|
+
timestamp ||= 0xffffffff
|
526
|
+
ip_proto ||= 0xff
|
527
|
+
port ||= 0xffff
|
528
|
+
reason ||= 0xff
|
529
|
+
ttl ||= 0xff
|
530
|
+
ip_version ||= 0xff
|
531
|
+
ipv6_hi ||= 0xffffffff_ffffffff
|
532
|
+
ipv6_lo ||= 0xffffffff_ffffffff
|
533
|
+
|
534
|
+
unless ip_version == 6
|
535
|
+
raise(CorruptedFile,"expected ip_version to be 6: #{ip_version.inspect}")
|
536
|
+
end
|
537
|
+
|
538
|
+
timestamp = decode_timestamp(timestamp)
|
539
|
+
ip_proto = lookup_ip_protocol(ip_proto)
|
540
|
+
reason = decode_reason(reason)
|
541
|
+
ipv6 = decode_ipv6(ipv6_hi,ipv6_lo)
|
542
|
+
|
543
|
+
return Status.new(
|
544
|
+
status,
|
545
|
+
ip_proto,
|
546
|
+
port,
|
547
|
+
reason,
|
548
|
+
ttl,
|
549
|
+
ipv6,
|
550
|
+
timestamp
|
551
|
+
)
|
552
|
+
end
|
553
|
+
|
554
|
+
#
|
555
|
+
# Parses a banner record.
|
556
|
+
#
|
557
|
+
# @param [String] buffer
|
558
|
+
# The buffer to parse.
|
559
|
+
#
|
560
|
+
# @return [Buffer]
|
561
|
+
# The parsed buffer record.
|
562
|
+
#
|
563
|
+
def self.parse_banner6(buffer)
|
564
|
+
timestamp, ip_proto, port, app_proto, ttl, ip_version, ipv6_hi, ipv6_lo, payload = buffer.unpack('L>CS>S>CCQ>Q>A*')
|
565
|
+
timestamp ||= 0xffffffff
|
566
|
+
protocol ||= 0xff
|
567
|
+
port ||= 0xffff
|
568
|
+
app_proto ||= 0xffff
|
569
|
+
ttl ||= 0xff
|
570
|
+
ip_version ||= 0xff
|
571
|
+
ipv6_hi ||= 0xffffffff_ffffffff
|
572
|
+
ipv6_lo ||= 0xffffffff_ffffffff
|
573
|
+
|
574
|
+
timestamp = decode_timestamp(timestamp)
|
575
|
+
ip_proto = lookup_ip_protocol(ip_proto)
|
576
|
+
app_proto = lookup_app_protocol(app_proto)
|
577
|
+
ipv6 = decode_ipv6(ipv6_hi,ipv6_lo)
|
578
|
+
|
579
|
+
return Banner.new(
|
580
|
+
ip_proto,
|
581
|
+
port,
|
582
|
+
ipv6,
|
583
|
+
timestamp,
|
584
|
+
app_proto,
|
585
|
+
payload
|
586
|
+
)
|
587
|
+
end
|
588
|
+
|
589
|
+
end
|
590
|
+
end
|
591
|
+
end
|