/* packet-sebek.c * Routines for Sebek - Kernel based data capture - packet dissection * Modified to add sebek V3 * Copyright 2006, Camilo Viecco * Copyright 1999, Nathan Neulinger * * See: http://project.honeynet.org/tools/sebek/ for more details * * $Id$ * * Wireshark - Network traffic analyzer * By Gerald Combs * Copyright 1998 Gerald Combs * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 2 * of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ #ifdef HAVE_CONFIG_H # include "config.h" #endif #include #include #include #include #include #include #include /* Sebek v2: IP address: 32bit unsigned MAGIC Val: 32bit unsigned Sebek Ver: 16bit unsigned #value must match 2 Type 16bit unsigned Counter: 32bit unsigned Time_sec: 32bit unsigned Time_usec: 32bit unsigned Proc ID: 32bit unsigned User ID: 32bit unsigned File Desc: 32bit unsigned Command: 12char array Length: Data Length Data: Variable Length data Sebek v3 header IP address: 32bit unsigned MAGIC Val: 32bit unsigned Sebek Ver: 16bit unsigned #value must match 3 Type 16bit unsigned Counter: 32bit unsigned Time_sec: 32bit unsigned Time_usec: 32bit unsigned Parent_pid: 32bit unsigned Proc ID: 32bit unsigned User ID: 32bit unsigned File Desc: 32bit unsigned inode: 32bit unsigned Command: 12char array Length: Data Length Data: Variable data length Sebekv3 has a sock_socket_record subheader for IPV4: Dest_ip: 32bit unsigned Dest_port: 16bit unsigned Src_ip: 32bit unsigned src_port: 16bit unsigned call: 16bit unsigned proto 8bit unsigned */ /* By default, but can be completely different */ #define UDP_PORT_SEBEK 1101 static int proto_sebek = -1; static int hf_sebek_magic = -1; static int hf_sebek_version = -1; static int hf_sebek_type = -1; static int hf_sebek_counter = -1; static int hf_sebek_time = -1; static int hf_sebek_pid = -1; static int hf_sebek_uid = -1; static int hf_sebek_fd = -1; static int hf_sebek_cmd = -1; static int hf_sebek_len = -1; static int hf_sebek_data = -1; static int hf_sebek_ppid = -1; static int hf_sebek_inode = -1; static int hf_sebek_socket_src_ip=-1; static int hf_sebek_socket_src_port=-1; static int hf_sebek_socket_dst_ip=-1; static int hf_sebek_socket_dst_port=-1; static int hf_sebek_socket_call=-1; static int hf_sebek_socket_proto=-1; static gint ett_sebek = -1; /* dissect_sebek - dissects sebek packet data * tvb - tvbuff for packet data (IN) * pinfo - packet info * proto_tree - resolved protocol tree */ static void dissect_sebek(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) { proto_tree *sebek_tree; proto_item *ti; int offset = 0; int datalen = 0; nstime_t ts; int sebek_ver = 0; int sebek_type = 0; int cmd_len = 0; if (check_col(pinfo->cinfo, COL_PROTOCOL)) col_set_str(pinfo->cinfo, COL_PROTOCOL, "SEBEK"); if (check_col(pinfo->cinfo, COL_INFO)) { col_clear(pinfo->cinfo, COL_INFO); col_set_str(pinfo->cinfo, COL_INFO, "SEBEK - "); if (tvb->length<6) sebek_ver = 0; else sebek_ver = tvb_get_ntohs(tvb, 4); switch (sebek_ver) { case 2: col_append_fstr(pinfo->cinfo, COL_INFO, " pid(%d)", tvb_get_ntohl(tvb, 20)); col_append_fstr(pinfo->cinfo, COL_INFO, " uid(%d)", tvb_get_ntohl(tvb, 24)); col_append_fstr(pinfo->cinfo, COL_INFO, " fd(%d)", tvb_get_ntohl(tvb, 28)); col_append_fstr(pinfo->cinfo, COL_INFO, " cmd: %s", tvb_format_text(tvb, 32, 12)); break; case 3: col_append_fstr(pinfo->cinfo, COL_INFO, " pid(%d)", tvb_get_ntohl(tvb, 24)); col_append_fstr(pinfo->cinfo, COL_INFO, " uid(%d)", tvb_get_ntohl(tvb, 28)); col_append_fstr(pinfo->cinfo, COL_INFO, " fd(%d)", tvb_get_ntohl(tvb, 32)); cmd_len = tvb_strnlen(tvb, 40, 12); if (cmd_len<0) cmd_len = 0; col_append_fstr(pinfo->cinfo, COL_INFO, " cmd: %s", tvb_format_text(tvb, 40, cmd_len)); break; default: break; } } if (tree) { /* Adding Sebek item and subtree */ ti = proto_tree_add_item(tree, proto_sebek, tvb, 0, -1, FALSE); sebek_tree = proto_item_add_subtree(ti, ett_sebek); /* check for minimum length before deciding where to go*/ if (tvb->length<6) sebek_ver = 0; else sebek_ver = tvb_get_ntohs(tvb, 4); switch (sebek_ver) { case 2: proto_tree_add_item(sebek_tree, hf_sebek_magic, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_version, tvb, offset, 2, FALSE); offset += 2; proto_tree_add_item(sebek_tree, hf_sebek_type, tvb, offset, 2, FALSE); offset += 2; proto_tree_add_item(sebek_tree, hf_sebek_counter, tvb, offset, 4, FALSE); offset += 4; ts.secs = tvb_get_ntohl(tvb, offset); ts.nsecs = tvb_get_ntohl(tvb, offset+4); proto_tree_add_time(sebek_tree, hf_sebek_time, tvb, offset, 8, &ts); offset += 8; proto_tree_add_item(sebek_tree, hf_sebek_pid, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_uid, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_fd, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_cmd, tvb, offset, 12, FALSE); offset += 12; datalen = tvb_get_letohl(tvb, offset); proto_tree_add_item(sebek_tree, hf_sebek_len, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_data, tvb, offset, -1, FALSE); break; case 3: proto_tree_add_item(sebek_tree, hf_sebek_magic, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_version, tvb, offset, 2, FALSE); offset += 2; sebek_type=tvb_get_ntohs(tvb, offset); proto_tree_add_item(sebek_tree, hf_sebek_type, tvb, offset, 2, FALSE); offset += 2; proto_tree_add_item(sebek_tree, hf_sebek_counter, tvb, offset, 4, FALSE); offset += 4; ts.secs = tvb_get_ntohl(tvb, offset); ts.nsecs = tvb_get_ntohl(tvb, offset+4); proto_tree_add_time(sebek_tree, hf_sebek_time, tvb, offset, 8, &ts); offset += 8; proto_tree_add_item(sebek_tree, hf_sebek_ppid, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_pid, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_uid, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_fd, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_inode, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_cmd, tvb, offset, 12, FALSE); offset += 12; datalen = tvb_get_ntohl(tvb, offset); proto_tree_add_item(sebek_tree, hf_sebek_len, tvb, offset, 4, FALSE); offset += 4; if (sebek_type == 2) { /*data is socket data, process accordingly*/ proto_tree_add_item(sebek_tree, hf_sebek_socket_dst_ip, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_socket_dst_port, tvb, offset, 2, FALSE); offset += 2; proto_tree_add_item(sebek_tree, hf_sebek_socket_src_ip, tvb, offset, 4, FALSE); offset += 4; proto_tree_add_item(sebek_tree, hf_sebek_socket_src_port, tvb, offset, 2, FALSE); offset += 2; proto_tree_add_item(sebek_tree, hf_sebek_socket_call, tvb, offset, 2, FALSE); offset += 2; proto_tree_add_item(sebek_tree, hf_sebek_socket_proto, tvb, offset, 1, FALSE); offset += 1; } else { proto_tree_add_item(sebek_tree, hf_sebek_data, tvb, offset, -1, FALSE); } break; default: break; } } } void proto_register_sebek(void) { static hf_register_info hf[] = { { &hf_sebek_magic, { "Magic", "sebek.magic", FT_UINT32, BASE_HEX, NULL, 0, "Magic Number", HFILL }}, { &hf_sebek_version, { "Version", "sebek.version", FT_UINT16, BASE_DEC, NULL, 0, "Version Number", HFILL }}, { &hf_sebek_type, { "Type", "sebek.type", FT_UINT16, BASE_DEC, NULL, 0, "Type", HFILL }}, { &hf_sebek_counter, { "Counter", "sebek.counter", FT_UINT32, BASE_DEC, NULL, 0, "Counter", HFILL }}, { &hf_sebek_time, { "Time", "sebek.time.sec", FT_ABSOLUTE_TIME, BASE_NONE, NULL, 0, "Time", HFILL }}, { &hf_sebek_pid, { "Process ID", "sebek.pid", FT_UINT32, BASE_DEC, NULL, 0, "Process ID", HFILL }}, { &hf_sebek_uid, { "User ID", "sebek.uid", FT_UINT32, BASE_DEC, NULL, 0, "User ID", HFILL }}, { &hf_sebek_fd, { "File Descriptor", "sebek.fd", FT_UINT32, BASE_DEC, NULL, 0, "File Descriptor Number", HFILL }}, { &hf_sebek_cmd, { "Command Name", "sebek.cmd", FT_STRING, 0, NULL, 0, "Command Name", HFILL }}, { &hf_sebek_len, { "Data Length", "sebek.len", FT_UINT32, BASE_DEC, NULL, 0, "Data Length", HFILL }}, { &hf_sebek_ppid, { "Parent Process ID", "sebek.ppid", FT_UINT32, BASE_DEC, NULL, 0, "Process ID", HFILL }}, { &hf_sebek_inode, { "Inode ID", "sebek.inode", FT_UINT32, BASE_DEC, NULL, 0, "Process ID", HFILL }}, { &hf_sebek_data, { "Data", "sebek.data", FT_STRING, 0, NULL, 0, "Data", HFILL }}, { &hf_sebek_socket_src_ip, { "Socket.local_ip", "sebek.socket.src_ip", FT_IPv4, 0, NULL, 0, "Socket.src_ip", HFILL }}, { &hf_sebek_socket_src_port, { "Socket.local_port", "sebek.socket.src_port", FT_UINT16, BASE_DEC, NULL, 0, "Socket.src_port", HFILL }}, { &hf_sebek_socket_dst_ip, { "Socket.remote_ip", "sebek.socket.dst_ip", FT_IPv4, 0, NULL, 0, "Socket.dst_ip", HFILL }}, { &hf_sebek_socket_dst_port, { "Socket.remote_port", "sebek.socket.dst_port", FT_UINT16, BASE_DEC, NULL, 0, "Socket.dst_port", HFILL }}, { &hf_sebek_socket_call, { "Socket.Call_id", "sebek.socket.call", FT_UINT16, BASE_DEC, NULL, 0, "Socket.call", HFILL }}, { &hf_sebek_socket_proto, { "Socket.ip_proto", "sebek.socket.ip_proto", FT_UINT8, BASE_DEC, NULL, 0, "Socket.ip_proto", HFILL }} }; static gint *ett[] = { &ett_sebek }; proto_sebek = proto_register_protocol("SEBEK - Kernel Data Capture", "SEBEK", "sebek"); proto_register_field_array(proto_sebek, hf, array_length(hf)); proto_register_subtree_array(ett, array_length(ett)); } void proto_reg_handoff_sebek(void) { dissector_handle_t sebek_handle; sebek_handle = create_dissector_handle(dissect_sebek, proto_sebek); dissector_add("udp.port", UDP_PORT_SEBEK, sebek_handle); }