monkey/chaos_monkey/network/tcp_scanner.py

42 lines
1.3 KiB
Python
Raw Normal View History

2015-08-30 15:27:35 +08:00
import time
2015-11-30 16:56:20 +08:00
from chaos_monkey.network import HostScanner, HostFinger
from chaos_monkey.model.host import VictimHost
from chaos_monkey.network.tools import check_port_tcp
2015-08-30 15:27:35 +08:00
__author__ = 'itamar'
BANNER_READ = 1024
2015-11-30 16:56:20 +08:00
class TcpScanner(HostScanner, HostFinger):
def __init__(self):
2015-08-30 15:27:35 +08:00
self._config = __import__('config').WormConfiguration
def is_host_alive(self, host):
return self.get_host_fingerprint(host, True)
def get_host_fingerprint(self, host, only_one_port=False):
2015-08-30 15:27:35 +08:00
assert isinstance(host, VictimHost)
count = 0
2015-08-30 15:27:35 +08:00
for target_port in self._config.tcp_target_ports:
is_open, banner = check_port_tcp(host.ip_addr,
target_port,
2015-10-08 18:30:36 +08:00
self._config.tcp_scan_timeout / 1000.0,
self._config.tcp_scan_get_banner)
if is_open:
2015-11-30 16:56:20 +08:00
count += 1
service = 'tcp-' + str(target_port)
host.services[service] = {}
if banner:
host.services[service]['banner'] = banner
if only_one_port:
break
else:
2015-08-30 15:27:35 +08:00
time.sleep(self._config.tcp_scan_interval / 1000.0)
2015-11-30 16:56:20 +08:00
return count != 0