1
0
mirror of synced 2024-11-14 18:07:36 +01:00
bemaniutils/bemani/utils/bemanishark.py
Jennifer Taylor 509cb4f0d9 Convert most of the format() string calls to f-strings using libcst.
Exact commands run were:

  python3 -m libcst.tool codemod convert_format_to_fstring.ConvertFormatStringCommand . --no-format
  python3 setup.py build_ext --inplace
2020-01-07 21:29:07 +00:00

86 lines
3.5 KiB
Python

from typing import Optional
import argparse
from bemani.sniff import Sniffer
from bemani.protocol import EAmuseProtocol, EAmuseException
from bemani.common import HTTP
def mainloop(address: Optional[str]=None, port: int=80, verbose: bool=False) -> None:
"""
Main loop of BEMANIShark. Starts an instance of Sniffer and EAmuseProtocol and does a
lazy job of banging them together with the above HTTP.parse. Will loop trying to decode
packets forever.
Arguments:
address - A string representing an IP of interest
port - An integer representing a port of interest
"""
sniffer = Sniffer(address=address, port=port)
parser = EAmuseProtocol()
while True:
packets = sniffer.recv_stream()
inbound = HTTP.parse(packets['inbound'], request=True)
outbound = HTTP.parse(packets['outbound'], response=True)
if inbound is not None:
if inbound['data'] is None:
in_req = None
else:
try:
in_req = parser.decode(
inbound['headers'].get('x-compress'),
inbound['headers'].get('x-eamuse-info'),
inbound['data']
)
except EAmuseException:
in_req = None
print(f"Inbound request (from {packets['source_address']}:{packets['source_port']} to {packets['destination_address']}:{packets['destination_port']}):")
if verbose:
print(f"HTTP {inbound['method']} request for URI {inbound['uri']}")
print(f"Compression is {inbound['headers'].get('x-compress', 'none')}")
print(f"Encryption key is {inbound['headers'].get('x-eamuse-info', 'none')}")
if in_req is None:
print("Inbound request was not parseable")
else:
print(in_req)
if outbound is not None:
if outbound['data'] is None:
out_req = None
else:
try:
out_req = parser.decode(
outbound['headers'].get('x-compress'),
outbound['headers'].get('x-eamuse-info'),
outbound['data']
)
except EAmuseException:
out_req = None
print(f"Outbound response (from {packets['destination_address']}:{packets['destination_port']} to {packets['source_address']}:{packets['source_port']}):")
if verbose:
print(f"Compression is {outbound['headers'].get('x-compress', 'none')}")
print(f"Encryption key is {outbound['headers'].get('x-eamuse-info', 'none')}")
if out_req is None:
print("Outbound response was not parseable")
else:
print(out_req)
def main() -> None:
parser = argparse.ArgumentParser(description="A utility to sniff packets and decode them as eAmusement packets. Should probably be run as root.")
parser.add_argument("-p", "--port", help="Port to sniff on. Defaults to 80", type=int, default=80)
parser.add_argument("-a", "--address", help="Address to sniff on. Defaults to all addresses", type=str, default=None)
parser.add_argument("-v", "--verbose", help="Show extra packet information", action='store_true')
args = parser.parse_args()
mainloop(address=args.address, port=args.port, verbose=args.verbose)
if __name__ == '__main__':
main()