caterpillar/server.py

665 lines
23 KiB
Python
Raw Normal View History

2024-02-28 06:11:49 +00:00
#!/usr/bin/python3
2024-02-28 06:33:04 +00:00
#
2024-02-28 06:11:49 +00:00
# server.py
2024-05-19 17:21:53 +00:00
# server file with TCP connection mode
2024-02-28 06:33:04 +00:00
#
2024-06-20 08:20:57 +00:00
# Caterpillar Proxy - The simple web debugging proxy (formerly, php-httpproxy)
2024-02-17 08:44:19 +00:00
# Namyheon Go (Catswords Research) <gnh1201@gmail.com>
2024-02-19 04:45:40 +00:00
# https://github.com/gnh1201/caterpillar
# Created at: 2022-10-06
2024-07-11 10:03:34 +00:00
# Updated at: 2024-07-11
2024-02-28 06:33:04 +00:00
#
2022-10-05 17:19:38 +00:00
import argparse
import socket
import sys
2022-11-24 09:02:32 +00:00
import os
2022-10-05 17:19:38 +00:00
from _thread import *
2024-02-28 07:40:08 +00:00
from subprocess import PIPE, Popen
2022-10-05 17:19:38 +00:00
import base64
2022-10-08 04:03:15 +00:00
import json
2022-11-24 09:02:32 +00:00
import ssl
2022-11-25 08:12:58 +00:00
import time
2024-02-22 08:16:07 +00:00
import traceback
2024-02-23 06:02:14 +00:00
import textwrap
2022-10-05 17:19:38 +00:00
from datetime import datetime
2022-10-06 12:09:34 +00:00
from platform import python_version
2022-10-05 17:19:38 +00:00
2022-10-06 12:09:34 +00:00
import requests
2024-02-28 07:10:16 +00:00
from requests.auth import HTTPBasicAuth
2024-03-06 09:20:33 +00:00
from urllib.parse import urlparse
2022-10-05 17:19:38 +00:00
from decouple import config
2024-07-11 10:02:08 +00:00
from base import (
Extension,
extract_credentials,
jsonrpc2_encode,
2024-07-11 10:03:34 +00:00
find_openssl_binpath,
2024-07-11 10:02:08 +00:00
Logger,
)
2024-05-19 17:18:19 +00:00
2024-08-31 05:37:21 +00:00
logger = Logger(name="server")
# initialization
2024-03-06 17:53:32 +00:00
try:
2024-07-11 10:02:08 +00:00
listening_port = config("PORT", default=5555, cast=int)
_username, _password, server_url = extract_credentials(
config("SERVER_URL", default="")
)
server_connection_type = config("SERVER_CONNECTION_TYPE", default="proxy")
2024-08-31 05:37:21 +00:00
ca_key = config("CA_KEY", default="ca.key")
ca_cert = config("CA_CERT", default="ca.crt")
cert_key = config("CERT_KEY", default="cert.key")
cert_dir = config("CERT_DIR", default="certs/")
openssl_bin_path = config("OPENSSL_BINPATH", default=find_openssl_binpath())
2024-07-11 10:02:08 +00:00
client_encoding = config("CLIENT_ENCODING", default="utf-8")
local_domain = config("LOCAL_DOMAIN", default="")
proxy_pass = config("PROXY_PASS", default="")
use_extensions = config("USE_EXTENSIONS", default="")
2024-03-06 17:53:32 +00:00
except KeyboardInterrupt:
logger.warning("[*] User has requested an interrupt")
logger.warning("[*] Application Exiting.....")
2024-03-06 17:53:32 +00:00
sys.exit()
except Exception as e:
logger.error("[*] Failed to initialize:", exc_info=e)
2024-03-06 17:53:32 +00:00
parser = argparse.ArgumentParser()
2024-07-11 10:02:08 +00:00
parser.add_argument(
"--max_conn", help="Maximum allowed connections", default=255, type=int
)
parser.add_argument(
"--buffer_size", help="Number of samples to be used", default=8192, type=int
)
2024-03-06 17:53:32 +00:00
args = parser.parse_args()
max_connection = args.max_conn
buffer_size = args.buffer_size
accepted_relay = {}
resolved_address_list = []
2024-05-19 17:18:19 +00:00
# set environment of Extension
Extension.set_buffer_size(buffer_size)
2024-07-11 10:02:08 +00:00
Extension.set_protocol("tcp")
2024-05-19 17:18:19 +00:00
2024-03-06 17:53:32 +00:00
# set basic authentication
auth = None
if _username:
auth = HTTPBasicAuth(_username, _password)
2024-07-11 07:02:51 +00:00
2024-08-31 05:37:21 +00:00
def parse_first_data(data: bytes):
2024-07-11 10:02:08 +00:00
parsed_data = (b"", b"", b"", b"", b"")
2024-02-23 03:53:44 +00:00
2022-11-25 10:32:17 +00:00
try:
2024-07-11 10:02:08 +00:00
first_line = data.split(b"\n")[0]
2022-11-25 10:32:17 +00:00
method, url = first_line.split()[0:2]
2024-07-11 10:02:08 +00:00
http_pos = url.find(b"://") # Finding the position of ://
scheme = b"http" # check http/https or other protocol
2022-11-25 10:32:17 +00:00
if http_pos == -1:
temp = url
else:
2024-07-11 10:02:08 +00:00
temp = url[(http_pos + 3) :]
2022-11-25 10:32:17 +00:00
scheme = url[0:http_pos]
2024-07-11 10:02:08 +00:00
port_pos = temp.find(b":")
2022-11-25 10:32:17 +00:00
2024-07-11 10:02:08 +00:00
webserver_pos = temp.find(b"/")
2022-11-25 10:32:17 +00:00
if webserver_pos == -1:
webserver_pos = len(temp)
2024-07-11 10:02:08 +00:00
webserver = b""
2022-11-25 10:32:17 +00:00
port = -1
if port_pos == -1 or webserver_pos < port_pos:
port = 80
webserver = temp[:webserver_pos]
else:
2024-07-11 10:02:08 +00:00
port = int((temp[(port_pos + 1) :])[: webserver_pos - port_pos - 1])
2022-11-25 10:32:17 +00:00
webserver = temp[:port_pos]
if port == 443:
2024-07-11 10:02:08 +00:00
scheme = b"https"
2024-02-23 03:53:44 +00:00
parsed_data = (webserver, port, scheme, method, url)
2022-11-25 10:32:17 +00:00
except Exception as e:
logger.error("[*] Exception on parsing the header", exc_info=e)
2024-02-23 03:53:44 +00:00
return parsed_data
2024-07-11 07:02:51 +00:00
2024-08-31 05:37:21 +00:00
def conn_string(conn: socket.socket, data: bytes, addr: bytes):
2024-03-06 09:01:46 +00:00
# JSON-RPC 2.0 request
2024-08-31 08:46:03 +00:00
def process_jsonrpc2(_data: bytes):
2024-08-31 05:37:21 +00:00
json_data = json.loads(_data.decode(client_encoding, errors="ignore"))
if json_data["jsonrpc"] == "2.0":
2024-07-11 10:02:08 +00:00
jsonrpc2_server(
2024-08-31 05:37:21 +00:00
conn, json_data["id"], json_data["method"], json_data["params"]
2024-07-11 10:02:08 +00:00
)
2024-03-06 09:01:46 +00:00
return True
return False
2024-03-06 09:28:17 +00:00
# JSON-RPC 2.0 request over Socket (stateful)
2024-07-11 10:02:08 +00:00
if data.find(b"{") == 0 and process_jsonrpc2(data):
2024-03-06 09:07:09 +00:00
# will be close by the client
2024-03-06 09:01:46 +00:00
return
2024-02-26 07:40:45 +00:00
2024-02-23 05:40:15 +00:00
# parse first data (header)
2024-02-23 03:53:44 +00:00
webserver, port, scheme, method, url = parse_first_data(data)
2022-11-25 08:12:58 +00:00
2024-03-06 09:28:17 +00:00
# JSON-RPC 2.0 request over HTTP (stateless)
2024-03-06 09:20:33 +00:00
path = urlparse(url.decode(client_encoding)).path
if path == "/proxy-cgi/jsonrpc2":
2024-07-11 10:02:08 +00:00
conn.send(b"HTTP/1.1 200 OK\r\nContent-Type: application/json\r\n\r\n")
pos = data.find(b"\r\n\r\n")
if pos > -1 and process_jsonrpc2(data[pos + 4 :]):
2024-07-11 07:02:51 +00:00
conn.close() # will be close by the server
2024-03-06 09:01:46 +00:00
return
2024-02-17 19:04:02 +00:00
# if it is reverse proxy
2024-07-11 10:02:08 +00:00
if local_domain != "":
2024-02-18 01:13:58 +00:00
localserver = local_domain.encode(client_encoding)
2024-07-11 10:02:08 +00:00
if webserver == localserver or data.find(b"\nHost: " + localserver) > -1:
logger.info("[*] Detected the reverse proxy request: %s" % local_domain)
2024-07-11 10:02:08 +00:00
scheme, _webserver, _port = proxy_pass.encode(client_encoding).split(b":")
2024-02-18 01:13:58 +00:00
webserver = _webserver[2:]
port = int(_port.decode(client_encoding))
2024-02-17 19:04:02 +00:00
2022-11-25 08:12:58 +00:00
proxy_server(webserver, port, scheme, method, url, conn, addr, data)
2024-07-11 07:02:51 +00:00
2024-08-31 05:37:21 +00:00
def jsonrpc2_server(
conn: socket.socket, _id: str, method: str, params: dict[str, str | int]
):
2024-03-04 09:37:44 +00:00
if method == "relay_accept":
2024-08-31 05:37:21 +00:00
accepted_relay[_id] = conn
2024-07-11 10:02:08 +00:00
connection_speed = params["connection_speed"]
2024-08-31 05:37:21 +00:00
logger.info("[*] connection speed: %s milliseconds" % str(connection_speed))
2024-03-04 09:37:44 +00:00
while conn.fileno() > -1:
time.sleep(1)
2024-08-31 05:37:21 +00:00
del accepted_relay[_id]
logger.info("[*] relay destroyed: %s" % _id)
2024-03-04 09:37:44 +00:00
else:
2024-08-31 05:37:21 +00:00
Extension.dispatch_rpcmethod(method, "call", _id, params, conn)
2024-03-02 07:01:03 +00:00
2024-07-11 10:02:08 +00:00
# return in conn_string()
2024-03-06 07:25:36 +00:00
2024-07-11 07:02:51 +00:00
2024-08-31 05:37:21 +00:00
def proxy_connect(webserver: bytes, conn: socket.socket):
2022-11-25 12:35:02 +00:00
hostname = webserver.decode(client_encoding)
2024-08-31 05:37:21 +00:00
cert_path = "%s/%s.crt" % (cert_dir.rstrip("/"), hostname)
2022-11-25 08:12:58 +00:00
2024-08-31 05:37:21 +00:00
if not os.path.exists(cert_dir):
os.makedirs(cert_dir)
2024-07-11 07:45:21 +00:00
2022-11-25 10:32:17 +00:00
# https://stackoverflow.com/questions/24055036/handle-https-request-in-proxy-server-by-c-sharp-connect-tunnel
2024-07-11 10:02:08 +00:00
conn.send(b"HTTP/1.1 200 Connection Established\r\n\r\n")
2022-11-25 08:12:58 +00:00
2022-11-25 10:32:17 +00:00
# https://github.com/inaz2/proxy2/blob/master/proxy2.py
2022-10-05 17:19:38 +00:00
try:
2024-08-31 05:37:21 +00:00
if not os.path.isfile(cert_path):
2022-11-25 08:12:58 +00:00
epoch = "%d" % (time.time() * 1000)
2024-07-11 10:02:08 +00:00
p1 = Popen(
[
2024-08-31 05:37:21 +00:00
openssl_bin_path,
2024-07-11 10:02:08 +00:00
"req",
"-new",
"-key",
2024-08-31 05:37:21 +00:00
cert_key,
2024-07-11 10:02:08 +00:00
"-subj",
"/CN=%s" % hostname,
],
stdout=PIPE,
)
2024-07-11 07:02:51 +00:00
p2 = Popen(
2024-07-11 10:02:08 +00:00
[
2024-08-31 05:37:21 +00:00
openssl_bin_path,
2024-07-11 10:02:08 +00:00
"x509",
"-req",
"-days",
"3650",
"-CA",
2024-08-31 05:37:21 +00:00
ca_cert,
2024-07-11 10:02:08 +00:00
"-CAkey",
2024-08-31 05:37:21 +00:00
ca_key,
2024-07-11 10:02:08 +00:00
"-set_serial",
epoch,
"-out",
2024-08-31 05:37:21 +00:00
cert_path,
2024-07-11 10:02:08 +00:00
],
stdin=p1.stdout,
stderr=PIPE,
)
2022-11-25 08:12:58 +00:00
p2.communicate()
2024-07-11 10:03:34 +00:00
except FileNotFoundError as e:
logger.error(
"[*] OpenSSL distribution not found on this system. Skipping certificate issuance.",
exc_info=e,
)
2024-08-31 05:37:21 +00:00
cert_path = "default.crt"
2022-10-06 02:24:19 +00:00
except Exception as e:
2024-07-11 10:03:34 +00:00
logger.error("[*] Skipping certificate issuance.", exc_info=e)
2024-08-31 05:37:21 +00:00
cert_path = "default.crt"
logger.info("[*] Certificate file: %s" % cert_path)
logger.info("[*] Private key file: %s" % cert_key)
2022-11-25 08:12:58 +00:00
2022-11-25 10:32:17 +00:00
# https://stackoverflow.com/questions/11255530/python-simple-ssl-socket-server
# https://docs.python.org/3/library/ssl.html
2022-11-25 08:12:58 +00:00
context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
2024-07-11 10:03:34 +00:00
context.check_hostname = False
context.verify_mode = ssl.CERT_NONE
2024-08-31 05:37:21 +00:00
context.load_cert_chain(certfile=cert_path, keyfile=cert_key)
2022-11-25 08:12:58 +00:00
2024-07-11 10:03:34 +00:00
try:
# https://stackoverflow.com/questions/11255530/python-simple-ssl-socket-server
conn = context.wrap_socket(conn, server_side=True)
data = conn.recv(buffer_size)
except ssl.SSLError as e:
logger.error(
2024-07-11 15:34:33 +00:00
"[*] SSL negotiation failed.",
2024-07-11 10:03:34 +00:00
exc_info=e,
)
2024-08-31 05:37:21 +00:00
return conn, b""
2022-10-05 17:19:38 +00:00
2024-08-31 05:37:21 +00:00
return conn, data
2022-11-24 09:02:32 +00:00
2024-07-11 07:02:51 +00:00
2024-08-31 05:37:21 +00:00
def proxy_check_filtered(
data: bytes, webserver: bytes, port: bytes, scheme: bytes, method: bytes, url: bytes
):
2024-02-17 12:50:36 +00:00
filtered = False
2024-02-17 12:21:24 +00:00
2024-03-01 15:38:48 +00:00
filters = Extension.get_filters()
logger.info("[*] Checking data with %s filters..." % (str(len(filters))))
2024-02-28 06:41:52 +00:00
for f in filters:
2024-02-28 06:33:04 +00:00
filtered = f.test(filtered, data, webserver, port, scheme, method, url)
2024-02-18 08:54:28 +00:00
2024-02-17 08:44:19 +00:00
return filtered
2024-02-17 05:40:33 +00:00
2024-07-11 07:02:51 +00:00
2024-08-31 05:37:21 +00:00
def proxy_server(
webserver: bytes,
port: bytes,
scheme: bytes,
method: bytes,
url: bytes,
conn: socket.socket,
addr: bytes,
data: bytes,
):
2022-10-05 17:19:38 +00:00
try:
logger.info("[*] Started the request. %s" % (str(addr[0])))
2022-10-08 04:23:40 +00:00
2024-02-18 03:59:24 +00:00
# SSL negotiation
2024-07-11 10:02:08 +00:00
is_ssl = scheme in [b"https", b"tls", b"ssl"]
if is_ssl and method == b"CONNECT":
2024-02-18 03:59:24 +00:00
while True:
try:
conn, data = proxy_connect(webserver, conn)
2024-07-11 07:02:51 +00:00
break # success
2024-07-11 10:02:08 +00:00
# except OSError as e:
2024-02-18 04:43:59 +00:00
# print ("[*] Retrying SSL negotiation... (%s:%s) %s" % (webserver.decode(client_encoding), str(port), str(e)))
2024-02-18 03:59:24 +00:00
except Exception as e:
2024-07-11 07:02:51 +00:00
raise Exception(
2024-07-11 10:02:08 +00:00
"SSL negotiation failed. (%s:%s) %s"
% (webserver.decode(client_encoding), str(port), str(e))
)
2022-11-24 09:02:32 +00:00
2024-02-23 04:15:49 +00:00
# override data
2024-02-23 03:59:22 +00:00
if is_ssl:
2024-02-23 06:02:14 +00:00
_, _, _, method, url = parse_first_data(data)
2024-02-23 03:59:22 +00:00
2024-02-22 08:16:07 +00:00
# https://stackoverflow.com/questions/44343739/python-sockets-ssl-eof-occurred-in-violation-of-protocol
2024-08-31 05:37:21 +00:00
def sock_close(_sock: socket.socket):
_sock.close()
2024-02-22 08:16:07 +00:00
2024-02-17 21:23:58 +00:00
# Wait to see if there is more data to transmit
2024-08-31 05:37:21 +00:00
def sendall(_sock: socket.socket, _conn: socket.socket, _data: bytes):
2024-02-18 17:10:13 +00:00
# send first chuck
2024-02-18 17:37:37 +00:00
if proxy_check_filtered(data, webserver, port, scheme, method, url):
2024-02-18 18:24:22 +00:00
sock.close()
2024-02-18 17:37:37 +00:00
raise Exception("Filtered request")
2024-02-18 17:10:13 +00:00
sock.send(data)
2024-02-18 17:05:28 +00:00
if len(data) < buffer_size:
return
2024-02-18 17:10:13 +00:00
# send following chunks
2024-07-11 10:02:08 +00:00
buffered = b""
2024-02-17 22:41:17 +00:00
conn.settimeout(1)
2024-02-17 21:23:58 +00:00
while True:
try:
chunk = conn.recv(buffer_size)
if not chunk:
break
2024-02-18 17:05:28 +00:00
buffered += chunk
2024-07-11 10:02:08 +00:00
if proxy_check_filtered(
buffered, webserver, port, scheme, method, url
):
2024-08-31 05:37:21 +00:00
sock_close(sock)
2024-02-18 17:05:28 +00:00
raise Exception("Filtered request")
2024-02-18 17:10:13 +00:00
sock.send(chunk)
2024-07-11 07:02:51 +00:00
if len(buffered) > buffer_size * 2:
2024-07-11 10:02:08 +00:00
buffered = buffered[-buffer_size * 2 :]
2024-02-17 21:23:58 +00:00
except:
break
2024-03-06 02:38:53 +00:00
# localhost mode
if server_url == "localhost" and server_connection_type == "proxy":
2024-02-17 05:23:51 +00:00
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
2024-02-17 05:40:33 +00:00
2024-02-22 08:16:07 +00:00
if is_ssl:
2024-02-17 08:44:19 +00:00
context = ssl.create_default_context()
context.check_hostname = False
context.verify_mode = ssl.CERT_NONE
2024-02-17 05:40:33 +00:00
2024-07-11 10:02:08 +00:00
sock = context.wrap_socket(
sock, server_hostname=webserver.decode(client_encoding)
)
2024-02-17 08:44:19 +00:00
sock.connect((webserver, port))
2024-07-11 10:02:08 +00:00
# sock.sendall(data)
2024-02-18 17:16:25 +00:00
sendall(sock, conn, data)
2024-02-17 08:44:19 +00:00
else:
sock.connect((webserver, port))
2024-07-11 10:02:08 +00:00
# sock.sendall(data)
2024-02-18 17:16:25 +00:00
sendall(sock, conn, data)
2024-02-17 05:23:51 +00:00
2024-02-17 05:26:27 +00:00
i = 0
2024-02-22 08:16:07 +00:00
is_http_403 = False
2024-08-31 05:37:21 +00:00
_buffered = b""
2024-02-17 05:23:51 +00:00
while True:
2024-02-17 08:44:19 +00:00
chunk = sock.recv(buffer_size)
2024-02-17 05:26:27 +00:00
if not chunk:
2024-02-17 05:23:51 +00:00
break
2024-07-11 10:02:08 +00:00
if i == 0 and chunk.find(b"HTTP/1.1 403") == 0:
2024-02-23 03:53:44 +00:00
is_http_403 = True
break
2024-08-31 05:37:21 +00:00
_buffered += chunk
if proxy_check_filtered(
_buffered, webserver, port, scheme, method, url
):
sock_close(sock)
2024-07-11 10:02:08 +00:00
add_filtered_host(webserver.decode(client_encoding), "127.0.0.1")
2024-02-18 17:05:28 +00:00
raise Exception("Filtered response")
2024-02-18 16:48:15 +00:00
conn.send(chunk)
2024-08-31 05:37:21 +00:00
if len(_buffered) > buffer_size * 2:
_buffered = _buffered[-buffer_size * 2 :]
2024-02-17 05:40:33 +00:00
i += 1
2024-02-17 05:26:27 +00:00
2024-02-22 08:16:07 +00:00
# when blocked
if is_http_403:
2024-07-11 10:02:08 +00:00
logger.warning(
"[*] Blocked the request by remote server: %s"
2024-08-31 05:37:21 +00:00
% webserver.decode(client_encoding)
2024-07-11 10:02:08 +00:00
)
2024-02-22 08:16:07 +00:00
2024-08-31 05:37:21 +00:00
def bypass_callback(response: requests.Response):
2024-02-23 05:06:01 +00:00
if response.status_code != 200:
2024-07-11 10:02:08 +00:00
conn.sendall(b'HTTP/1.1 403 Forbidden\r\n\r\n{"status":403}')
2024-02-23 05:06:01 +00:00
return
# https://stackoverflow.com/questions/20658572/python-requests-print-entire-http-request-raw
2024-07-11 10:02:08 +00:00
format_headers = lambda d: "\r\n".join(
f"{k}: {v}" for k, v in d.items()
)
first_data = (
textwrap.dedent(
"HTTP/1.1 {res.status_code} {res.reason}\r\n{reshdrs}\r\n\r\n"
)
.format(
res=response,
reshdrs=format_headers(response.headers),
)
.encode(client_encoding)
)
2024-02-23 05:06:01 +00:00
conn.send(first_data)
for chunk in response.iter_content(chunk_size=buffer_size):
conn.send(chunk)
2024-07-11 10:02:08 +00:00
if is_ssl and method == b"GET":
logger.info("[*] Trying to bypass blocked request...")
2024-07-11 07:02:51 +00:00
remote_url = "%s://%s%s" % (
2024-07-11 10:02:08 +00:00
scheme.decode(client_encoding),
webserver.decode(client_encoding),
url.decode(client_encoding),
)
requests.get(
remote_url,
stream=True,
verify=False,
hooks={"response": bypass_callback},
)
2024-02-23 05:06:01 +00:00
else:
2024-07-11 10:02:08 +00:00
conn.sendall(b'HTTP/1.1 403 Forbidden\r\n\r\n{"status":403}')
2024-02-23 05:06:01 +00:00
2024-08-31 05:37:21 +00:00
sock_close(sock)
2024-02-22 08:16:07 +00:00
2024-07-11 10:02:08 +00:00
logger.info(
"[*] Received %s chunks. (%s bytes per chunk)"
% (str(i), str(buffer_size))
)
2024-02-17 08:44:19 +00:00
2024-02-26 13:07:45 +00:00
# stateful mode
2024-02-26 08:35:58 +00:00
elif server_connection_type == "stateful":
2024-02-26 08:28:10 +00:00
proxy_data = {
2024-07-11 10:02:08 +00:00
"headers": {
"User-Agent": "php-httpproxy/0.1.5 (Client; Python "
+ python_version()
+ "; abuse@catswords.net)",
2024-02-26 08:28:10 +00:00
},
2024-07-11 10:02:08 +00:00
"data": {
2024-02-26 08:28:10 +00:00
"buffer_size": str(buffer_size),
"client_address": str(addr[0]),
"client_port": str(listening_port),
"client_encoding": client_encoding,
"remote_address": webserver.decode(client_encoding),
"remote_port": str(port),
"scheme": scheme.decode(client_encoding),
2024-07-11 10:02:08 +00:00
"datetime": datetime.now().strftime("%Y-%m-%d %H:%M:%S.%f"),
},
2024-02-26 08:28:10 +00:00
}
2024-02-26 13:07:45 +00:00
# get client address
logger.info("[*] resolving the client address...")
2024-02-27 09:30:05 +00:00
while len(resolved_address_list) == 0:
try:
2024-07-11 10:02:08 +00:00
_, query_data = jsonrpc2_encode("get_client_address")
query = requests.post(
server_url,
headers=proxy_data["headers"],
data=query_data,
timeout=1,
auth=auth,
)
2024-02-27 09:30:05 +00:00
if query.status_code == 200:
2024-07-11 10:02:08 +00:00
result = query.json()["result"]
resolved_address_list.append(result["data"])
logger.info("[*] resolved IP: %s" % (result["data"]))
2024-07-31 06:39:48 +00:00
except requests.exceptions.ReadTimeout:
2024-02-27 09:30:05 +00:00
pass
2024-07-11 10:02:08 +00:00
proxy_data["data"]["client_address"] = resolved_address_list[0]
2024-02-26 13:07:45 +00:00
# build a tunnel
2024-02-27 09:51:05 +00:00
def relay_connect(id, raw_data, proxy_data):
try:
# The tunnel connect forever until the client destroy it
2024-07-11 10:02:08 +00:00
relay = requests.post(
server_url,
headers=proxy_data["headers"],
data=raw_data,
stream=True,
timeout=None,
auth=auth,
)
2024-02-27 09:51:05 +00:00
for chunk in relay.iter_content(chunk_size=buffer_size):
2024-07-11 10:02:08 +00:00
jsondata = json.loads(
chunk.decode(client_encoding, errors="ignore")
)
if jsondata["jsonrpc"] == "2.0" and ("error" in jsondata):
e = jsondata["error"]
logger.error(
"[*] Error received from the relay server: (%s) %s"
% (str(e["code"]), str(e["message"]))
)
2024-02-27 09:51:05 +00:00
except requests.exceptions.ReadTimeout as e:
pass
2024-07-11 07:02:51 +00:00
2024-07-11 10:02:08 +00:00
id, raw_data = jsonrpc2_encode("relay_connect", proxy_data["data"])
2024-02-27 09:51:05 +00:00
start_new_thread(relay_connect, (id, raw_data, proxy_data))
2024-02-26 08:28:10 +00:00
# wait for the relay
logger.info("[*] waiting for the relay... %s" % id)
2024-02-27 09:30:05 +00:00
max_reties = 30
t = 0
2024-07-31 06:39:48 +00:00
while t < max_reties and id not in accepted_relay:
2024-02-26 08:28:10 +00:00
time.sleep(1)
2024-02-27 09:30:05 +00:00
t += 1
if t < max_reties:
sock = accepted_relay[id]
logger.info("[*] connected the relay. %s" % id)
2024-02-27 09:30:05 +00:00
sendall(sock, conn, data)
else:
resolved_address_list.remove(resolved_address_list[0])
logger.info("[*] the relay is gone. %s" % id)
2024-08-31 05:37:21 +00:00
sock_close(sock)
2024-02-27 09:30:05 +00:00
return
2024-02-17 08:44:19 +00:00
2024-02-26 08:35:58 +00:00
# get response
i = 0
2024-07-11 10:02:08 +00:00
buffered = b""
2024-02-26 08:35:58 +00:00
while True:
2024-08-31 05:37:21 +00:00
_chunk = sock.recv(buffer_size)
if not _chunk:
2024-02-26 08:35:58 +00:00
break
2024-08-31 05:37:21 +00:00
buffered += _chunk
2024-02-26 08:35:58 +00:00
if proxy_check_filtered(buffered, webserver, port, scheme, method, url):
2024-08-31 05:37:21 +00:00
sock_close(sock)
2024-07-11 10:02:08 +00:00
add_filtered_host(webserver.decode(client_encoding), "127.0.0.1")
2024-02-26 08:35:58 +00:00
raise Exception("Filtered response")
2024-08-31 05:37:21 +00:00
conn.send(_chunk)
2024-07-11 07:02:51 +00:00
if len(buffered) > buffer_size * 2:
2024-07-11 10:02:08 +00:00
buffered = buffered[-buffer_size * 2 :]
2024-02-26 08:35:58 +00:00
i += 1
2024-08-31 05:37:21 +00:00
sock_close(sock)
2024-02-26 13:07:45 +00:00
2024-07-11 10:02:08 +00:00
logger.info(
"[*] Received %s chunks. (%s bytes per chunk)"
% (str(i), str(buffer_size))
)
2024-02-26 08:35:58 +00:00
2024-03-06 02:38:53 +00:00
# stateless mode
elif server_connection_type == "stateless":
2024-02-17 05:23:51 +00:00
proxy_data = {
2024-07-11 10:02:08 +00:00
"headers": {
"User-Agent": "php-httpproxy/0.1.5 (Client; Python "
+ python_version()
+ "; abuse@catswords.net)",
2024-02-17 05:23:51 +00:00
},
2024-07-11 10:02:08 +00:00
"data": {
2024-02-26 02:41:19 +00:00
"buffer_size": str(buffer_size),
2024-02-26 05:11:09 +00:00
"request_data": base64.b64encode(data).decode(client_encoding),
"request_length": str(len(data)),
2024-02-26 04:07:02 +00:00
"client_address": str(addr[0]),
"client_port": str(listening_port),
2024-02-26 02:41:19 +00:00
"client_encoding": client_encoding,
2024-02-26 04:02:48 +00:00
"remote_address": webserver.decode(client_encoding),
2024-02-26 02:41:19 +00:00
"remote_port": str(port),
2024-02-17 05:23:51 +00:00
"scheme": scheme.decode(client_encoding),
2024-07-11 10:02:08 +00:00
"datetime": datetime.now().strftime("%Y-%m-%d %H:%M:%S.%f"),
},
2022-11-24 09:02:32 +00:00
}
2024-07-11 10:02:08 +00:00
_, raw_data = jsonrpc2_encode("relay_request", proxy_data["data"])
2024-02-17 05:40:33 +00:00
logger.info("[*] Sending %s bytes..." % (str(len(raw_data))))
2024-02-17 05:40:33 +00:00
2024-02-17 05:23:51 +00:00
i = 0
2024-07-11 10:02:08 +00:00
relay = requests.post(
server_url,
headers=proxy_data["headers"],
data=raw_data,
stream=True,
auth=auth,
)
buffered = b""
2024-02-17 05:23:51 +00:00
for chunk in relay.iter_content(chunk_size=buffer_size):
2024-02-18 16:48:15 +00:00
buffered += chunk
if proxy_check_filtered(buffered, webserver, port, scheme, method, url):
2024-07-11 10:02:08 +00:00
add_filtered_host(webserver.decode(client_encoding), "127.0.0.1")
2024-02-18 17:05:28 +00:00
raise Exception("Filtered response")
2024-02-18 16:48:15 +00:00
conn.send(chunk)
2024-07-11 07:02:51 +00:00
if len(buffered) > buffer_size * 2:
2024-07-11 10:02:08 +00:00
buffered = buffered[-buffer_size * 2 :]
2024-02-17 05:40:33 +00:00
i += 1
2024-07-11 10:02:08 +00:00
logger.info(
"[*] Received %s chunks. (%s bytes per chunk)"
% (str(i), str(buffer_size))
)
2022-10-05 17:19:38 +00:00
2024-03-06 02:38:53 +00:00
# nothing at all
else:
2024-03-06 04:46:29 +00:00
connector = Extension.get_connector(server_connection_type)
if connector:
logger.info("[*] Connecting...")
2024-03-06 04:46:29 +00:00
connector.connect(conn, data, webserver, port, scheme, method, url)
else:
raise Exception("Unsupported connection type")
2024-03-06 02:38:53 +00:00
logger.info("[*] Request and received. Done. %s" % (str(addr[0])))
2022-10-05 17:19:38 +00:00
conn.close()
2022-11-25 08:12:58 +00:00
except Exception as e:
2024-02-22 08:16:07 +00:00
print(traceback.format_exc())
logger.error("[*] Exception on requesting the data.", exc_info=e)
2024-07-11 10:02:08 +00:00
conn.sendall(b'HTTP/1.1 403 Forbidden\r\n\r\n{"status":403}')
2022-10-05 17:19:38 +00:00
conn.close()
2024-07-11 07:02:51 +00:00
2024-02-18 08:16:14 +00:00
# journaling a filtered hosts
2024-08-31 05:37:21 +00:00
def add_filtered_host(domain: str, ip_address: str):
2024-07-11 10:02:08 +00:00
hosts_path = "./filtered.hosts"
with open(hosts_path, "r") as file:
2024-02-17 16:49:29 +00:00
lines = file.readlines()
domain_exists = any(domain in line for line in lines)
if not domain_exists:
lines.append(f"{ip_address}\t{domain}\n")
2024-07-11 10:02:08 +00:00
with open(hosts_path, "w") as file:
2024-02-17 16:49:29 +00:00
file.writelines(lines)
2024-02-18 22:58:44 +00:00
2024-07-11 07:02:51 +00:00
2024-07-11 10:02:08 +00:00
def start(): # Main Program
2024-02-28 06:11:49 +00:00
try:
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
2024-08-31 05:37:21 +00:00
2024-07-11 10:02:08 +00:00
sock.bind(("", listening_port))
2024-02-28 06:11:49 +00:00
sock.listen(max_connection)
logger.info("[*] Server started successfully [ %d ]" % listening_port)
2024-03-05 03:27:38 +00:00
except Exception as e:
logger.error("[*] Unable to Initialize Socket", exc_info=e)
2024-02-28 06:11:49 +00:00
sys.exit(2)
2024-02-18 22:58:44 +00:00
2024-02-28 06:11:49 +00:00
while True:
try:
2024-07-11 10:02:08 +00:00
conn, addr = sock.accept() # Accept connection from client browser
data = conn.recv(buffer_size) # Recieve client data
start_new_thread(conn_string, (conn, data, addr)) # Starting a thread
2024-02-28 06:11:49 +00:00
except KeyboardInterrupt:
sock.close()
logger.info("[*] Graceful Shutdown")
2024-02-28 06:11:49 +00:00
sys.exit(1)
2024-02-18 22:58:44 +00:00
2024-07-11 07:02:51 +00:00
if __name__ == "__main__":
2024-07-11 07:05:56 +00:00
# Fix Value error
if use_extensions:
# load extensions
2024-07-11 10:02:08 +00:00
for s in use_extensions.split(","):
2024-07-11 07:05:56 +00:00
Extension.register(s)
else:
logger.warning("[*] No extensions registered")
2024-07-04 06:00:58 +00:00
2024-07-09 07:41:02 +00:00
# start Caterpillar
2022-10-05 17:19:38 +00:00
start()