2025-01-02 17:27:37 +08:00
|
|
|
|
package main
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"fmt"
|
|
|
|
|
"log"
|
|
|
|
|
"net"
|
|
|
|
|
"os"
|
|
|
|
|
"os/signal"
|
|
|
|
|
"syscall"
|
|
|
|
|
|
|
|
|
|
"github.com/google/gopacket"
|
|
|
|
|
"github.com/google/gopacket/layers"
|
|
|
|
|
"github.com/google/gopacket/pcap"
|
|
|
|
|
"github.com/google/gopacket/pcapgo"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
// 打印可用的网络接口信息
|
|
|
|
|
func printAvailableInterfaces() {
|
|
|
|
|
devices, err := pcap.FindAllDevs()
|
|
|
|
|
if err != nil {
|
|
|
|
|
log.Fatal(err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fmt.Println("可用的网络接口:")
|
|
|
|
|
for _, device := range devices {
|
|
|
|
|
fmt.Printf("名称: %s\n描述: %s\n地址: %+v\n\n", device.Name, device.Description, device.Addresses)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// 判断 IP 是否在链表中
|
|
|
|
|
func isIPInList(ip net.IP) bool {
|
2025-01-06 12:06:38 +08:00
|
|
|
|
for e := IpList.Front(); e != nil; e = e.Next() {
|
2025-01-02 17:27:37 +08:00
|
|
|
|
if e.Value.(net.IP).Equal(ip) {
|
|
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// 打印捕获到的每个数据包的信息
|
|
|
|
|
func printPacketInfo(packet gopacket.Packet) {
|
|
|
|
|
ipLayer := packet.Layer(layers.LayerTypeIPv4)
|
|
|
|
|
|
|
|
|
|
if ipLayer != nil {
|
|
|
|
|
ip, _ := ipLayer.(*layers.IPv4)
|
2025-01-06 12:06:38 +08:00
|
|
|
|
IpMutex.Lock()
|
|
|
|
|
defer IpMutex.Unlock()
|
2025-01-02 17:27:37 +08:00
|
|
|
|
if !isIPInList(ip.SrcIP) {
|
2025-01-06 12:06:38 +08:00
|
|
|
|
IpList.PushBack(ip.SrcIP)
|
2025-01-02 18:15:07 +08:00
|
|
|
|
log.Printf("\033[31m 已添加源 IP: %s 到链表 \033[0m\n", ip.SrcIP)
|
2025-01-02 17:27:37 +08:00
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func startPacketCapture() {
|
2025-01-06 12:06:38 +08:00
|
|
|
|
handle, err := pcap.OpenLive(*InterfaceName, 65535, true, pcap.BlockForever)
|
2025-01-02 17:27:37 +08:00
|
|
|
|
if err != nil {
|
2025-01-06 12:06:38 +08:00
|
|
|
|
log.Fatalf("打开网络接口 %s 出错: %v", *InterfaceName, err)
|
2025-01-02 17:27:37 +08:00
|
|
|
|
}
|
|
|
|
|
defer func() {
|
|
|
|
|
fmt.Println("清理资源...")
|
|
|
|
|
if handle != nil {
|
|
|
|
|
handle.Close()
|
|
|
|
|
}
|
|
|
|
|
}()
|
|
|
|
|
|
2025-01-06 12:06:38 +08:00
|
|
|
|
err = handle.SetBPFFilter(*Protocol)
|
2025-01-02 17:27:37 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
log.Fatalf("设置 BPF 过滤器出错: %v", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var pcapWriter *pcapgo.Writer
|
2025-01-06 12:06:38 +08:00
|
|
|
|
if *PcapFile != "" {
|
|
|
|
|
file, err := os.Create(*PcapFile)
|
2025-01-02 17:27:37 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
log.Fatalf("创建输出文件出错: %v", err)
|
|
|
|
|
}
|
|
|
|
|
defer file.Close()
|
|
|
|
|
|
|
|
|
|
pcapWriter = pcapgo.NewWriter(file)
|
|
|
|
|
err = pcapWriter.WriteFileHeader(65535, layers.LinkTypeEthernet)
|
|
|
|
|
if err != nil {
|
|
|
|
|
log.Fatalf("写入全局头部出错: %v", err)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
packetSource := gopacket.NewPacketSource(handle, handle.LinkType())
|
2025-01-06 12:06:38 +08:00
|
|
|
|
fmt.Printf("正在监听网络接口 %s,使用过滤器 '%s'...\n", *InterfaceName, *Protocol)
|
2025-01-02 17:27:37 +08:00
|
|
|
|
|
|
|
|
|
sigChan := make(chan os.Signal, 1)
|
|
|
|
|
signal.Notify(sigChan, os.Interrupt, syscall.SIGTERM)
|
|
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
|
for packet := range packetSource.Packets() {
|
|
|
|
|
printPacketInfo(packet)
|
|
|
|
|
if pcapWriter != nil {
|
|
|
|
|
err := pcapWriter.WritePacket(packet.Metadata().CaptureInfo, packet.Data())
|
|
|
|
|
if err != nil {
|
|
|
|
|
log.Printf("写入数据包出错: %v", err)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}()
|
|
|
|
|
|
|
|
|
|
<-sigChan
|
|
|
|
|
fmt.Println("\n停止抓包...")
|
|
|
|
|
}
|