Wireshark-dev: [Wireshark-dev] Sniff WLAN packets
#include <pcap.h>
#include <stdio.h>
#include <stdlib.h>
#include <errno.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <netinet/if_ether.h> 
#include <net/ethernet.h>
#include <netinet/ether.h> 
#include <netinet/ip.h> 
/* tcpdump header (ether.h) defines ETHER_HDRLEN) */
#ifndef ETHER_HDRLEN 
#define ETHER_HDRLEN 14
#endif
/*
 * Structure of an internet header, naked of options.
 *
 * Stolen from tcpdump source (thanks tcpdump people)
 *
 * We declare ip_len and ip_off to be short, rather than u_short
 * pragmatically since otherwise unsigned comparisons can result 
 * against negative integers quite easily, and fail in subtle ways.
 */
struct my_ip {
 u_int8_t ip_vhl;  /* header length, version */
#define IP_V(ip) (((ip)->ip_vhl & 0xf0) >> 4)
#define IP_HL(ip) ((ip)->ip_vhl & 0x0f) 
 u_int8_t ip_tos;  /* type of service */
 u_int16_t ip_len;  /* total length */
 u_int16_t ip_id;  /* identification */
 u_int16_t ip_off;  /* fragment offset field */
#define IP_DF 0x4000   /* dont fragment flag */ 
#define IP_MF 0x2000   /* more fragments flag */
#define IP_OFFMASK 0x1fff  /* mask for fragmenting bits */
 u_int8_t ip_ttl;  /* time to live */
 u_int8_t ip_p;  /* protocol */
 u_int16_t ip_sum;  /* checksum */ 
 struct in_addr ip_src,ip_dst; /* source and dest address */
};
main()
{
    pcap_if_t *alldevs;
    pcap_if_t *d;
    pcap_t *p;
    pcap_t *adhandle; 
    int i=0;
    int inum;
    int res;
    int datalink;
    char errbuf[PCAP_ERRBUF_SIZE];
    char timestr[16];
    struct tm *ltime;
    struct pcap_pkthdr *header;
    struct ether_header *eptr; 
    const struct my_ip* ip;
    u_char *pkt_data;
    u_short ether_type;
        
    /* Retrieve the device list */
    if (pcap_findalldevs(&alldevs, errbuf) == -1)
    {
        fprintf(stderr,"Error in pcap_findalldevs: %s\n", errbuf);
        exit(1);
    } 
 
    
    /* Print the list */
    for(d=alldevs; d; d=d->next)
    {
        printf("%d. %s", ++i, d->name);
        if (d->description)
            printf(" (%s)\n", d->description); 
        else
            printf(" (No description available) \n");
    }
    
    if(i==0)
    {
        printf("\nNo interfaces found! Make sure WinPcap is installed.\n");
        return -1;
    }
    
    printf("Enter the interface number (1-%d):",i); 
    scanf("%d", &inum);
    
    if(inum < 1 || inum > i)
    {
        printf("\nInterface number out of range.\n");
        /* Free the device list */
        pcap_freealldevs(alldevs); 
        return -1;
    }
    
    /* Jump to the selected adapter */
    for(d=alldevs, i=0; i< inum-1 ;d=d->next, i++);
    
    /* Open the adapter */
    if ( (adhandle= pcap_open_live(d->name, // name of the device 
        65536,     // portion of the packet to capture. 
        // 65536 grants that the whole packet will be captured on all the MACs.
        1,         // promiscuous mode
        1000,      // read timeout 
        errbuf     // error buffer
        ) ) == NULL)
    {
        fprintf(stderr,"\nUnable to open the adapter. %s is not supported by WinPcap\n");
        /* Free the device list */
        pcap_freealldevs(alldevs); 
        return -1;
    }
    
    printf("\nlistening on %s... \n", d->name);
 if(datalink=pcap_datalink(adhandle)<0){
  printf("\nDatalink Error: %s\n",errbuf);
 }
 printf("\nDatalink=%s\n\n", pcap_datalink_val_to_name(datalink));
 
    
    
    /* At this point, we don't need any more the device list. Free it */
    pcap_freealldevs(alldevs);
    
    /* Retrieve the packets */
    while((res = pcap_next_ex( adhandle, &header, &pkt_data)) >= 0){
        
        if(res == 0)
            /* Timeout elapsed */
            continue;
        
        /* convert the timestamp to readable format */
        ltime=localtime(&header->ts.tv_sec);
        strftime( timestr, sizeof timestr, "%H:%M:%S", ltime);
        
        printf("%s,%.6d; len:%d; ", timestr, header-> 
ts.tv_usec, header->len);
/////////////////////////////////////////// MAC
       /* lets start with the ether header... */
       eptr = (struct ether_header *) pkt_data;
       ether_type = ntohs(eptr->ether_type);
       /* check to see if we have an ip packet */
       if (ether_type == ETHERTYPE_IP)
       {
           fprintf(stdout,"Type(IP); ");
       }else  if (ether_type == ETHERTYPE_ARP)
       { 
           fprintf(stdout,"Type(ARP); ");
       }else  if (eptr->ether_type == ETHERTYPE_REVARP)
       {
           fprintf(stdout,"Type(RARP); ");
       }else {
           fprintf(stdout,"Type(?); "); 
       }
       /* Lets print SOURCE DEST TYPE LENGTH */
       fprintf(stdout,"MAC: ");
       fprintf(stdout,"%s/"
            ,ether_ntoa((struct ether_addr*)eptr->ether_shost));
       fprintf(stdout,"%s; " 
            ,ether_ntoa((struct ether_addr*)eptr->ether_dhost));
/////////////////////////////////////////// IP
    u_int length = header->len;
    u_int hlen,off,version;
int len;
    /* jump pass the ethernet header */
    ip = (struct my_ip*)(pkt_data + sizeof(struct ether_header));
    length -= sizeof(struct ether_header); 
    /* check to see we have a packet of valid length */
    if (length < sizeof(struct my_ip))
    {
        printf("truncated ip %d",length);
        return NULL;
    }
    len     = ntohs(ip->ip_len);
    hlen    = IP_HL(ip); /* header length */
    version = IP_V(ip);/* ip version */
    /* Check to see if we have the first fragment */
    off = ntohs(ip->ip_off);
    if((off & 0x1fff) == 0 )/* aka no 1's in first 13 bits */
    {/* print SOURCE DESTINATION hlen version len offset */ 
        fprintf(stdout,"IP: ");
        fprintf(stdout,"%s/",
                inet_ntoa(ip->ip_src));
        fprintf(stdout,"%s.\n",
                inet_ntoa(ip->ip_dst), 
                hlen,version,len,off);
    }    /* check version */
    if(version != 4)
    {
      fprintf(stdout,"Unknown version %d\n",version);
    }
    /* check header length */
    if(hlen < 5 )
    {
        fprintf(stdout,"bad-hlen %d \n",hlen);
    }
    /* see if we have as much packet as we should */
    if(length < len)
        printf("truncated IP - %d bytes missing\n",len - length);
///////////////////////////////////////////
    }
    
    if(res == -1){
        printf("Error reading the packets: %s\n", pcap_geterr(adhandle));
        return -1;
    }
    
    return 0; 
}
- Follow-Ups:
- Re: [Wireshark-dev] Sniff WLAN packets
- From: Guy Harris
 
 
 - Re: [Wireshark-dev] Sniff WLAN packets
 
- Prev by Date: [Wireshark-dev] (no subject)
 - Next by Date: [Wireshark-dev] Problem by writing a plugin, how to access the previous telegram?
 - Previous by thread: [Wireshark-dev] (no subject)
 - Next by thread: Re: [Wireshark-dev] Sniff WLAN packets
 - Index(es):