dexto Posted February 7, 2010 Posted February 7, 2010 (edited) expandcollapse popup#NoTrayIcon #Region ;**** Directives created by AutoIt3Wrapper_GUI **** #AutoIt3Wrapper_Change2CUI=y #EndRegion ;**** Directives created by AutoIt3Wrapper_GUI **** #include "winpcap.au3" Global $pcap Global $iScan = 0 Global $iAlive = 0 ;declare array that will be filled with what ip's we will be scanning Dim $aIPSendArray[2] = [1, 0] Dim $aAliveHosts[1] = [0] ; initialise the Library $winpcap = _PcapSetup() If ($winpcap = -1) Then ConsoleWrite("WinPcap not found!") Exit EndIf ; Get the interfaces list for which a capture is possible $pcap_devices = _PcapGetDeviceList() If ($pcap_devices = -1) Then ConsoleWrite(_PcapGetLastError()) Exit EndIf ; $tmp = 0 For $i = 0 To UBound($pcap_devices) - 1 ; look for Ethernet adapter with valid IP and MAC address that is not WMvare virtual. If IsIPAddress($pcap_devices[$i][7]) and $pcap_devices[$i][7]<>"0.0.0.0" and $pcap_devices[$i][3] == "EN10MB" And StringInStr($pcap_devices[$i][6], '00:50:56:') == 0 Then $tmp += 1 $iInput = $i + 1 $sAdapterName = StringMid($pcap_devices[$i][1], StringInStr($pcap_devices[$i][1], "'", 0, 1) + 1) $sAdapterName = StringMid($sAdapterName, 1, StringInStr($sAdapterName, "'", 0, 1) - 1) ConsoleWrite($i + 1 & ". " & $sAdapterName & " (MAC Address: " & $pcap_devices[$i][6] &" IP:"&$pcap_devices[$i][7]& ")" & @CRLF) EndIf Next If $tmp == 0 Then ConsoleWrite("No Net adapter found." & @CRLF) Exit EndIf ; use console input to set the adapter index If $tmp > 1 Then ConsoleWrite("Choose Adapter: ") $iInput = Number(cmdRead()) ;$iInput = 4 ;debug EndIf ; validate console input If $iInput > $i Or $iInput < 1 Then ConsoleWrite("No such adapter." & @CRLF) Exit EndIf ; Zero based index $iInput -= 1 ConsoleWrite(@CRLF) ; start capture only UDP packets $pcap = _PcapStartCapture($pcap_devices[$iInput][0], "udp", 1) If ($pcap = -1) Then ConsoleWrite(_PcapGetLastError()) Exit EndIf scan() _PcapStopCapture($pcap) _PcapFree() Func scan() $t = TimerInit() $tmout = 100 $ops = 0 ; capture only for 60 sec. While TimerDiff($t) < 60000 ; call func getPacket for every packet in the buffer ; when there is not packets left in the buffer ; returns # of packets processed (times func was called) $ops = _PcapDispatchToFunc($pcap, "getPacket") ; fancy: adjust Sleep time to amount fo the packets comming in the buffer If $ops > 1 Then $tmout -= $ops*10 if $tmout < 1 then $tmout = 1 ElseIf $ops == 0 And $tmout < 1000 Then $tmout += 10 EndIf ;c($ops&@tab&$tmout) Sleep($tmout) WEnd EndFunc ;==>scan ;function that runs everytime we get a packet Func getPacket($packet) ; source port in HEX $srcPort = StringMid($packet[3], 71, 4) ; if source port is DHCP server Dec 67 = Hex 43 If ($srcPort == "0043") Then c("DHCP Server responds (MAC "&StringMid($packet[3], 15, 12)&"; IP HEX "&StringMid($packet[3], 55, 8)&") Offering IP HEX "&StringMid($packet[3], 119, 8)) ;c("Packet: "&$packet[3]) c() EndIf ; if target port is DHCP client Dec 68 = Hex 44 If ($srcPort == "0044") Then if StringMid($packet[3], 87, 2) == "01" Then c("Asking for IP and PXE BOOT FILE (MAC "&StringMid($packet[3], 15, 12)&")") Else c("Asking for IP (MAC "&StringMid($packet[3], 15, 12)&")") EndIf ;c("Packet: "&$packet[3]) c() EndIf EndFunc ;==>getPacket Func IsIPAddress($text) Return StringRegExp($text, "(((25[0-5])|(2[0-4][0-9])|(1[0-9][0-9])|([1-9]?[0-9]))\.){3}((25[0-5])|(2[0-4][0-9])|(1[0-9][0-9])|([1-9]?[0-9]))") EndFunc ;==>IsIPAddress Func cmdRead() Local $input = "" $file = FileOpen("con", 4) While 1 $chr = FileRead($file, 1) If $chr = @LF Then ExitLoop $input &= BinaryToString($chr) Sleep(50) WEnd FileClose($file) $input = StringReplace($input, @CR, "") Return $input EndFunc ;==>cmdRead Func c($txt="") ConsoleWrite($txt & @CRLF) EndFunc ;==>cAttached as DHCPmon.au3Needs:Winpcap.au3and winpcap installed.This is very simple example anyone can make it much more useful with a bit of time invested.(currently expanding it to microPXE server or microDHCP with readonly embeded TFTP for use with GHOST on my RIS server) Edited February 8, 2010 by dexto
rogdog Posted February 8, 2010 Posted February 8, 2010 No good for me. I get the following error "Unable to Locate Component This application has failed to start because packet.dll was not found. Re-installing the application may fix the problem" My Scripts[topic="73325"]_ReverseDNS()[/topic]Favourite scripts by other members[topic="81687"]SNMP udf[/topic][topic="70759"]Using SNMP - MIB protocol[/topic][topic="39050"]_SplitMon:Section off your monitor!, split your monitor into sections for easy management[/topic][topic="73425"]ZIP.au3 UDF in pure AutoIt[/topic][topic="10534"]WMI ScriptOMatic tool for AutoIt[/topic][topic="51103"]Resources UDF embed/use any data/files into/from AutoIt compiled EXE files[/topic]
ProgAndy Posted February 8, 2010 Posted February 8, 2010 You have to install winpcap first *GERMAN* [note: you are not allowed to remove author / modified info from my UDFs]My UDFs:[_SetImageBinaryToCtrl] [_TaskDialog] [AutoItObject] [Animated GIF (GDI+)] [ClipPut for Image] [FreeImage] [GDI32 UDFs] [GDIPlus Progressbar] [Hotkey-Selector] [Multiline Inputbox] [MySQL without ODBC] [RichEdit UDFs] [SpeechAPI Example] [WinHTTP]UDFs included in AutoIt: FTP_Ex (as FTPEx), _WinAPI_SetLayeredWindowAttributes
lgvlgv Posted December 6, 2012 Posted December 6, 2012 This is great, do you know how to pick upp every message from DHCP server? Like a kind of sniffer to see if any client on the network is haveing trubble with getting an ipaddress, if for example the scope is full on server.
lgvlgv Posted December 6, 2012 Posted December 6, 2012 (edited) is this an error?i use the script on one machine and then i release and renew the dhcpclient on second machine, it looks like both comunicate over same port and the server reply is wrong.if i changed this If ($srcPort == "0044") Then c("Packet: "&$packet[1]) c("Packet: "&$packet[2]) c("Packet: "&$packet[3]) Local $stl1=StringLen ($packet[3]) if StringMid($packet[3], 87, 2) == "01" Then c("Asking for IP and PXE BOOT FILE (MAC "&StringMid($packet[3], 15, 12)&")") c("DHCP Server responds (MAC "&StringMid($packet[3], 15, 12)&"; IP HEX "&StringMid($packet[3], 63, 8)&") Offering IP HEX "&StringMid($packet[3],595, 8)) ; Local $kebab =StringLen ($packet[3]) ; c($kebab) Else c("Asking for IP (MAC "&StringMid($packet[3], 15, 12)&")") EndIf ;c("Packet: "&$packet[3]) c() EndIfthe result was this1. Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller(NDIS6.20) (MAC Address: 00:22:15:B3:6F:2C IP:192.168.58.17)Packet: 342Packet: 342Packet: 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 for IP and PXE BOOT FILE (MAC 00904BCEAE15)DHCP Server responds (MAC 00904BCEAE15; IP HEX FFFFFFFF) Offering IP HEX 153204C0Packet: 351Packet: 351Packet: 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 for IP and PXE BOOT FILE (MAC 00904BCEAE15)DHCP Server responds (MAC 00904BCEAE15; IP HEX FFFFFFFF) Offering IP HEX C0A83A6A+>13:48:21 AutoIT3.exe ended.rc:0this is the correct ip = C0A83A6A Edited December 6, 2012 by lgvlgv
lgvlgv Posted December 6, 2012 Posted December 6, 2012 i modified it little, i know im crappy at this maybe u can update this correcly).. expandcollapse popup#NoTrayIcon #Region ;**** Directives created by AutoIt3Wrapper_GUI **** #AutoIt3Wrapper_Change2CUI=y #EndRegion ;**** Directives created by AutoIt3Wrapper_GUI **** #include "winpcap.au3" Global $pcap Global $iScan = 0 Global $iAlive = 0 ;declare array that will be filled with what ip's we will be scanning Dim $aIPSendArray[2] = [1, 0] Dim $aAliveHosts[1] = [0] ; initialise the Library $winpcap = _PcapSetup() If ($winpcap = -1) Then ConsoleWrite("WinPcap not found!") Exit EndIf ; Get the interfaces list for which a capture is possible $pcap_devices = _PcapGetDeviceList() If ($pcap_devices = -1) Then ConsoleWrite(_PcapGetLastError()) Exit EndIf ; $tmp = 0 For $i = 0 To UBound($pcap_devices) - 1 ; look for Ethernet adapter with valid IP and MAC address that is not WMvare virtual. If IsIPAddress($pcap_devices[$i][7]) and $pcap_devices[$i][7]<>"0.0.0.0" and $pcap_devices[$i][3] == "EN10MB" And StringInStr($pcap_devices[$i][6], '00:50:56:') == 0 Then $tmp += 1 $iInput = $i + 1 $sAdapterName = StringMid($pcap_devices[$i][1], StringInStr($pcap_devices[$i][1], "'", 0, 1) + 1) $sAdapterName = StringMid($sAdapterName, 1, StringInStr($sAdapterName, "'", 0, 1) - 1) ConsoleWrite($i + 1 & ". " & $sAdapterName & " (MAC Address: " & $pcap_devices[$i][6] &" IP:"&$pcap_devices[$i][7]& ")" & @CRLF) EndIf Next If $tmp == 0 Then ConsoleWrite("No Net adapter found." & @CRLF) Exit EndIf ; use console input to set the adapter index If $tmp > 1 Then ConsoleWrite("Choose Adapter: ") $iInput = Number(cmdRead()) ;$iInput = 4 ;debug EndIf ; validate console input If $iInput > $i Or $iInput < 1 Then ConsoleWrite("No such adapter." & @CRLF) Exit EndIf ; Zero based index $iInput -= 1 ConsoleWrite(@CRLF) ; start capture only UDP packets $pcap = _PcapStartCapture($pcap_devices[$iInput][0], "udp", 1) If ($pcap = -1) Then ConsoleWrite(_PcapGetLastError()) Exit EndIf scan() _PcapStopCapture($pcap) _PcapFree() Func scan() $t = TimerInit() $tmout = 100 $ops = 0 ; capture only for 60 sec. While TimerDiff($t) < 600000 ; call func getPacket for every packet in the buffer ; when there is not packets left in the buffer ; returns # of packets processed (times func was called) $ops = _PcapDispatchToFunc($pcap, "getPacket") ; fancy: adjust Sleep time to amount fo the packets comming in the buffer If $ops > 1 Then $tmout -= $ops*10 if $tmout < 1 then $tmout = 1 ElseIf $ops == 0 And $tmout < 1000 Then $tmout += 10 EndIf ;c($ops&@tab&$tmout) Sleep($tmout) WEnd EndFunc ;==>scan ;function that runs everytime we get a packet Func getPacket($packet) ; source port in HEX $srcPort = StringMid($packet[3], 71, 4) ; if target port is DHCP client Dec 68 = Hex 44 If ($srcPort == "0044" or StringMid($packet[3], 15, 12) = "00904BCEAE15") Then Local $stl1=c(StringLen ($packet[3])) if StringMid($packet[3], 87, 2) == "01" Then if StringLen($packet[3])<"687" Then c("Asking for IP and PXE BOOT FILE (MAC "&StringMid($packet[3], 15, 12)&")") ; c("Packet: "&$packet[3]) c("") ElseIf StringLen($packet[3])>"686" Then c("DHCP Server responds (MAC "&StringMid($packet[3], 15, 12)&"; IP HEX "&StringMid($packet[3], 63, 8)&") Offering IP HEX "&StringMid($packet[3],595, 8)) c("Packet: "&$packet[3]) Else c("Packet: "&$packet[3]) EndIf Else c("Asking for IP renewel (MAC "&StringMid($packet[3], 15, 12)&")") c("Packet: "&$packet[3]) EndIf ; c("Port 68: " & $packet[3]) ; c("Packet: MAC: "&StringMid($packet[3], 15, 12)) ;c("Packet: "&$packet[3]) EndIf ; if source port is DHCP server Dec 67 = Hex 43 If ($srcPort == "0043") Then c("Port 67, Packet: "&$packet[3]) ; c("Packet: "&$packet[1]) ; c("Packet: "&$packet[2]) ; c("Packet: "&$packet[3]) ; c("DHCP Server responds (MAC "&StringMid($packet[3], 15, 12)&"; IP HEX "&StringMid($packet[3], 55, 8)&") Offering IP HEX "&StringMid($packet[3], 119, 8)) ; c("DHCP Server responds (MAC "&StringMid($packet[3], 15, 12)&"; IP HEX "&StringMid($packet[3], 63, 8)&") Offering IP HEX "&StringMid($packet[3],595, 8)) ;:c("Packet: "&$packet[3]) c("Port 67: " & $packet[3]) EndIf EndFunc ;==>getPacket Func IsIPAddress($text) Return StringRegExp($text, "(((25[0-5])|(2[0-4][0-9])|(1[0-9][0-9])|([1-9]?[0-9])).){3}((25[0-5])|(2[0-4][0-9])|(1[0-9][0-9])|([1-9]?[0-9]))") EndFunc ;==>IsIPAddress Func cmdRead() Local $input = "" $file = FileOpen("con", 4) While 1 $chr = FileRead($file, 1) If $chr = @LF Then ExitLoop $input &= BinaryToString($chr) Sleep(50) WEnd FileClose($file) $input = StringReplace($input, @CR, "") Return $input EndFunc ;==>cmdRead Func c($txt="") ConsoleWrite($txt & @CRLF) EndFunc ;==>c the result became this, and i would like/try to find all responses for the "Asking for IP renewel" lines after.. PS. i hardcoded my mac to filter the output. OUTPUT: 1. Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller(NDIS6.20) (MAC Address: 00:22:15:B3:6F:2C IP:192.168.58.17) 686 Asking for IP and PXE BOOT FILE (MAC 00904BCEAE15) 704 DHCP Server responds (MAC 00904BCEAE15; IP HEX FFFFFFFF) Offering IP HEX C0A83A6A Packet: 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sking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060461800008011FDBAC0A83A6AC0A83AFF00890089004CAE93835D291000010000000000012045494550454E45464341434143414341434143414341434143414341434141410000200001C00C00200001000493E000060000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060461C00008011FDB6C0A83A6AC0A83AFF00890089004CAE93835D291000010000000000012045494550454E45464341434143414341434143414341434143414341434141410000200001C00C00200001000493E000060000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060461D00008011FDB5C0A83A6AC0A83AFF00890089004CAE93835D291000010000000000012045494550454E45464341434143414341434143414341434143414341434141410000200001C00C00200001000493E000060000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060461E00008011FDB4C0A83A6AC0A83AFF00890089004CAF93835D281000010000000000012045494550454E45464341434143414341434143414341434143414341434141410000200001C00C00200001000493E000060000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060461F00008011FDB3C0A83A6AC0A83AFF00890089004C387D835E291000010000000000012045424643454345464645464445484643464646414641434143414341434141410000200001C00C00200001000493E000068000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060462000008011FDB2C0A83A6AC0A83AFF00890089004C387D835E291000010000000000012045424643454345464645464445484643464646414641434143414341434141410000200001C00C00200001000493E000068000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060462100008011FDB1C0A83A6AC0A83AFF00890089004C387D835E291000010000000000012045424643454345464645464445484643464646414641434143414341434141410000200001C00C00200001000493E000068000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060462200008011FDB0C0A83A6AC0A83AFF00890089004C397D835E281000010000000000012045424643454345464645464445484643464646414641434143414341434141410000200001C00C00200001000493E000068000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060462300008011FDAFC0A83A6AC0A83AFF00890089004C2A7B835F2910000100000000000120454246434543454646454644454846434646464146414341434143414341424F0000200001C00C00200001000493E000068000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060462400008011FDAEC0A83A6AC0A83AFF00890089004CAE8E8360291000010000000000012045494550454E45464341434143414341434143414341434143414341434143410000200001C00C00200001000493E000060000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060462500008011FDADC0A83A6AC0A83AFF00890089004C2A7B835F2910000100000000000120454246434543454646454644454846434646464146414341434143414341424F0000200001C00C00200001000493E000068000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060462600008011FDACC0A83A6AC0A83AFF00890089004CAE8E8360291000010000000000012045494550454E45464341434143414341434143414341434143414341434143410000200001C00C00200001000493E000060000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060462700008011FDABC0A83A6AC0A83AFF00890089004C2A7B835F2910000100000000000120454246434543454646454644454846434646464146414341434143414341424F0000200001C00C00200001000493E000068000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060462800008011FDAAC0A83A6AC0A83AFF00890089004CAE8E8360291000010000000000012045494550454E45464341434143414341434143414341434143414341434143410000200001C00C00200001000493E000060000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060463300008011FD9FC0A83A6AC0A83AFF00890089004C2B7B835F2810000100000000000120454246434543454646454644454846434646464146414341434143414341424F0000200001C00C00200001000493E000068000C0A83A6A 222 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE15080045000060463400008011FD9EC0A83A6AC0A83AFF00890089004CAF8E8360281000010000000000012045494550454E45464341434143414341434143414341434143414341434143410000200001C00C00200001000493E000060000C0A83A6A 436 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE150800450000CB463B00008011FD2CC0A83A6AC0A83AFF008A008A00B7158011028361C0A83A6A008A00A100002045494550454E45464341434143414341434143414341434143414341434141410020454246434543454646454644454846434646464146414341434143414341424E00FF534D422500000000000000000000000000000000000000000000000000000011000007000000000000000000E803000000000000000007005600030001000100020018005C4D41494C534C4F545C42524F575345000200484F4D4500 488 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE150800450000E5463C00008011FD11C0A83A6AC0A83AFF008A008A00D1B7DE11028362C0A83A6A008A00BB00002045494550454E45464341434143414341434143414341434143414341434143410020454246434543454646454644454846434646464146414341434143414341424E00FF534D422500000000000000000000000000000000000000000000000000000011000021000000000000000000E803000000000000000021005600030001000000020032005C4D41494C534C4F545C42524F57534500010080FC0A00484F4D4500000000000044471F0302000501031001000F0155AA00 434 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE150800450000CA469900008011FCCFC0A83A6AC0A83AFF008A008A00B6A31311028364C0A83A6A008A00A000002045494550454E45464341434143414341434143414341434143414341434141410020454246434543454646454644454846434646464146414341434143414341424E00FF534D422500000000000000000000000000000000000000000000000000000011000006000000000000000000E803000000000000000006005600030001000100020017005C4D41494C534C4F545C42524F57534500090401000000 186 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE1508004500004E469A00008011FD4AC0A83A6AC0A83AFF00890089003A24C583660110000100000000000020454246434543454646454644454846434646464146414341434143414341424C0000200001 186 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE1508004500004E469B00008011FD49C0A83A6AC0A83AFF00890089003A24C583660110000100000000000020454246434543454646454644454846434646464146414341434143414341424C0000200001 186 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE1508004500004E469C00008011FD48C0A83A6AC0A83AFF00890089003A24C583660110000100000000000020454246434543454646454644454846434646464146414341434143414341424C0000200001 186 Asking for IP renewel (MAC 00904BCEAE15) Packet: 0xFFFFFFFFFFFF00904BCEAE1508004500004E469D00008011FD47C0A83A6AC0A83AFF00890089003AE1C783670110000100000000000020454845504547454D45464649465045494550454E4546434143414341434143410000200001
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now