Last active
September 30, 2021 11:50
-
-
Save Frago9876543210/2e5de55f1bb7e42594b73f5665391bf4 to your computer and use it in GitHub Desktop.
bedrock_server packet tracer
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
declare(strict_types=1); | |
use pocketmine\network\mcpe\protocol\PacketPool; | |
use pocketmine\utils\BinaryDataException; | |
require_once "vendor/autoload.php"; | |
$packetPool = PacketPool::getInstance(); | |
while(($buffer = fgets(STDIN)) !== false){ | |
$buffer = base64_decode(substr($buffer, 0, -1)); | |
try{ | |
$pk = $packetPool->getPacket($buffer); | |
$pk->decode(); | |
var_dump($pk); | |
}catch(BinaryDataException $e){ | |
echo "{$e->getMessage()}\n{$e->getTraceAsString()}\n"; | |
} | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python3 | |
# -*- coding: utf-8 -*- | |
import frida | |
import sys | |
import json | |
import argparse | |
import subprocess | |
import base64 | |
def validateMode(mode): | |
if mode not in 'rw': | |
raise argparse.ArgumentTypeError('Unknown mode') | |
return mode | |
parser = argparse.ArgumentParser(description='bedrock_server packet tracer') | |
parser.add_argument('mode', help='"r" - read, "w" - write', type=validateMode) | |
parser.add_argument('packets', help='write packets that interest you', type=str, nargs='+') | |
args = parser.parse_args() | |
try: | |
session = frida.attach('bedrock_server') | |
except frida.ProcessNotFoundError: | |
sys.exit('Could not find bedrock_server') | |
except frida.PermissionDeniedError as e: | |
sys.exit(e) | |
process = subprocess.Popen(['php', 'dump.php'], stdin=subprocess.PIPE, stdout=sys.stdout) | |
def onMessage(message, data): | |
print(message['payload']) | |
process.stdin.write(base64.b64encode(data) + b'\n') | |
process.stdin.flush() | |
try: | |
script = session.create_script(""" | |
var stringLength = new NativeFunction(Module.findExportByName(null, '_ZNKSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEE6lengthEv'), 'int', ['pointer']); | |
recv('input', function(message) { | |
var mode = message.mode; | |
var doRead = mode.includes('r'); | |
var doWrite = mode.includes('w'); | |
JSON.parse(message.payload).forEach(function(packet) { | |
var read = Module.findExportByName(null, '_ZN' + packet.length + packet + '4readER20ReadOnlyBinaryStream'); | |
var write = Module.findExportByName(null, '_ZNK' + packet.length + packet + '5writeER12BinaryStream'); | |
if (read === null || write === null) { | |
console.log('Could not find symbol for ' + packet); | |
} else { | |
if (doRead) { | |
Interceptor.attach(read, { | |
onEnter: function(args) { | |
this.pointer = args[1]; | |
}, | |
onLeave: function(retval) { | |
var realAddr = Memory.readPointer(this.pointer.add(56)); | |
var rlen = stringLength(realAddr); | |
send('from Client:', Memory.readByteArray(Memory.readPointer(realAddr), rlen)); | |
} | |
}); | |
} | |
if (doWrite) { | |
Interceptor.attach(write, { | |
onEnter: function(args) { | |
this.pointer = args[1]; | |
}, | |
onLeave: function(retval) { | |
var realAddr = Memory.readPointer(this.pointer.add(56)); | |
var rlen = stringLength(realAddr); | |
send('from Server:', Memory.readByteArray(Memory.readPointer(realAddr), rlen)); | |
} | |
}); | |
} | |
} | |
}); | |
}); | |
""") | |
script.on('message', onMessage) | |
script.load() | |
script.post({ | |
'type': 'input', | |
'payload': json.dumps(args.packets), | |
'mode': args.mode | |
}) | |
sys.stdin.read() | |
except KeyboardInterrupt: | |
sys.exit(0) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment