我试图使用dpkt库从pcap生成所有域名及其相应IP地址的列表( 这里 )
我的代码主要是基于这的
filename = raw_input('Type filename of pcap file (without extention): ')
path = 'c:/temp/PcapParser/' + filename + '.pcap'
f = open(path, 'rb')
pcap = dpkt.pcap.Reader(f)
for ts, buf in pcap:
#make sure we are dealing with IP traffic
try:
eth = dpkt.ethernet.Ethernet(buf)
except:
continue
if eth.type != 2048:
continue
#make sure we are dealing with UDP protocol
try:
ip = eth.data
except:
continue
if ip.p != 17:
continue
#filter on UDP assigned ports for DNS
try:
udp = ip.data
except:
continue
if udp.sport != 53 and udp.dport != 53:
continue
#make the dns object out of the udp data and
#check for it being a RR (answer) and for opcode QUERY
try:
dns = dpkt.dns.DNS(udp.data)
except:
continue
if dns.qr != dpkt.dns.DNS_R:
continue
if dns.opcode != dpkt.dns.DNS_QUERY:
continue
if dns.rcode != dpkt.dns.DNS_RCODE_NOERR:
continue
if len(dns.an) < 1:
continue
#process and print responses based on record type
for answer in dns.an:
if answer.type == 1: #DNS_A
print 'Domain Name: ', answer.name, '\tIP Address: ', socket.inet_ntoa(answer.rdata)问题是answer.name对我来说不够好,因为我需要原始的域名请求,而不是它的‘CNAME表示。例如,最初的DNS请求之一是针对www.paypal.com的,但它的CNAME表示形式是paypal.112.2o7.net。
我仔细查看了代码,发现我实际上是从DNS响应(而不是查询)中提取信息。然后我查看了wireshark中的响应包,发现原来的域在“查询”和“答案”下面,所以我的问题是如何提取它?
谢谢!
发布于 2013-07-28 06:33:33
为了通过由dns.qd提供的dpkt.dns对象从DNS响应的“问题”部分获取名称,我只需要做以下工作:
for qname in dns.qd: print qname.namehttps://stackoverflow.com/questions/17880931
复制相似问题