Advertisement
opexxx

sniff-client-ciphers.pl

Apr 17th, 2014
174
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 4.16 KB | None | 0 0
  1. #!/usr/bin/perl -w
  2. use strict;
  3. use autodie qw(:all);
  4. use File::Temp qw(tempdir);
  5.  
  6. ##############################################################################
  7. #
  8. # take care -- this thing is fragile. That is, the emulator environment is
  9. # fragile.
  10. #
  11. # run all available versions of android in the emulator, open an HTTPS
  12. # URL in the system browser, and sniff the browser's cipher list
  13. #
  14. # make sure no other android devices/emulators are connected while running
  15. # this script!
  16. #
  17. # since the "android" command cannot reliably generate AVDs, you need to
  18. # generate those AVDs yourself, and name them "asc<apilevel>", e.g. "asc13".
  19. #
  20. #
  21. # prerequisites:
  22. # - an android SDK/emulator setup on a linux machine, with "android",
  23. #   "adb" and "emulator" in the $PATH
  24. # - all the system images for the versions you want to run
  25. # - sniff-client-ciphers from ../sniff-client-ciphers
  26. #
  27. #
  28. ##############################################################################
  29.  
  30. my $usage = "usage: $0 pcap-output-dir apilevel\n";
  31.  
  32. my $outputdir = shift || die $usage;
  33. my $apilevel = shift || die $usage;
  34.  
  35. # versions indexed by API level
  36. # source: https://developer.android.com/guide/topics/manifest/uses-sdk-element.html#ApiLevels
  37. my %androidversion = ( 2 => '1.1',
  38.                3 => '1.5',
  39.                4 => '1.6',
  40.                5 => '2.0',
  41.                6 => '2.0.1',
  42.                7 => '2.1',
  43.                8 => '2.2',
  44.                9 => '2.3-2.3.2',
  45.                10 => '2.3.3-2.3.7',
  46.                11 => '3.0',
  47.                12 => '3.1',
  48.                13 => '3.2',
  49.                14 => '4.0-4.0.2',
  50.                15 => '4.0.3-4.0.4',
  51.                16 => '4.1',
  52.                17 => '4.2',
  53.                18 => '4.3',
  54.                19 => '4.4',
  55.              );
  56.  
  57. my $tmpdir = tempdir(CLEANUP => 1);
  58. print "Base dir: $tmpdir\n";
  59.  
  60. run_one_apilevel($apilevel);
  61.  
  62. sub run_one_apilevel {
  63.   my $apilevel = shift;
  64.  
  65. #  my $n = create_avd($apilevel);
  66.   my($pid, $pcap) = start_avd($apilevel);
  67.   # wait until the emulator has truly booted...
  68.   print "waiting for boot to complete...\n";
  69.   sleep(60);
  70.   print "starting browser...\n";
  71.   send_intent("-a android.intent.action.VIEW -d https://git.bettercrypto.org");
  72.   sleep(30);
  73.   stop_avd($pid);
  74. #  delete_avd($apilevel);
  75.   print "pcap file for API $apilevel is $pcap\n";
  76.   system("../sniff-client-ciphers/sniff-client-ciphers.pl 'tcp.port==443' $pcap 'Android $androidversion{$apilevel}' > $outputdir/Android_$androidversion{$apilevel}.txt");
  77. }
  78.  
  79. # send an intent via "am start" command in the emulator.
  80. # parameter is a string to be given as arguments to "am start"
  81. # returns 1 when OK, undef on error
  82. sub send_intent {
  83.   my($intent) = shift;
  84.  
  85.   my $count = 60;
  86.   while($count--) {
  87.     my @result = `adb shell am start $intent`;
  88.     if(grep /^Error/, @result) {
  89.       print "ERROR\n";
  90.     } else {
  91.       return 1;
  92.     }
  93.     sleep(1);
  94.   }
  95.   return undef;
  96. }
  97.  
  98. # fork a child and run the emulator
  99. # return the ($emulator_pid, $pcap_filename)
  100. sub start_avd {
  101.   my($apilevel) = shift;
  102.  
  103.   my $name = "asc$apilevel";
  104.   my $pcapfile = "$outputdir/$name.pcap";
  105.   my($pid) = fork();
  106.   if(!defined $pid) {
  107.     die "start_avd: can't fork: $!\n";
  108.   } elsif($pid) {
  109.     # wait for emulator to be ready...
  110.     print "emulator $name started, waiting for readyness...\n";
  111.     system(qw(adb wait-for-device));
  112.     return ($pid, $pcapfile);
  113.   } else {
  114.     exec(qw(emulator -avd), $name, qw(-no-boot-anim -tcpdump),
  115.      $pcapfile);
  116.   }
  117. }
  118.  
  119. sub stop_avd {
  120.   my $pid = shift;
  121.   kill("TERM", $pid);
  122.   print "waiting for $pid to terminate...\n";
  123.   waitpid($pid, 0);
  124. }
  125.  
  126.  
  127.  
  128. #adb shell am start -a android.intent.action.VIEW -d https://www.ssllabs.com/ssltest/viewMyClient.html
  129. # tshark -r /tmp/tls -d tcp.port==4433,ssl -O ssl
  130.  
  131.  
  132.  
  133. sub create_avd {
  134.   my($apilevel) = shift;
  135.   my $name = "asc$apilevel";
  136.   delete_avd($apilevel);
  137.   # "echo" is required because the command asks a question...
  138.   system("echo | android -s create avd --name $name --target $apilevel --path $tmpdir/$name");
  139.   print "created avd $name\n";
  140.   $name;
  141. }
  142.  
  143. sub delete_avd {
  144.   my($apilevel) = shift;
  145.   my $name = "asc$apilevel";
  146.   ## ignore errors
  147.   eval {
  148.     system(qw(android -s delete avd --name), $name);
  149.   }
  150. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement