mirror of
https://github.com/AlienMajik/pwnagotchi_plugins.git
synced 2025-07-01 18:37:27 -04:00

SnoopR updated version (2.0.1) brings exciting new features, including mesh networking for collaborative wardriving, aircraft tracking for aerial monitoring, and performance optimizations for smoother operation.
856 lines
42 KiB
Python
856 lines
42 KiB
Python
import logging
|
|
import sqlite3
|
|
import os
|
|
from threading import Lock, Thread
|
|
from datetime import datetime, timedelta
|
|
import time
|
|
from math import radians, sin, cos, sqrt, atan2
|
|
import subprocess
|
|
import pwnagotchi.plugins as plugins
|
|
from pwnagotchi.ui.components import LabeledValue
|
|
from pwnagotchi.ui.view import BLACK
|
|
import pwnagotchi.ui.fonts as fonts
|
|
from flask import render_template_string, request, jsonify
|
|
import json
|
|
import socket
|
|
import select
|
|
import requests
|
|
|
|
class Database:
|
|
def __init__(self, path):
|
|
self.__path = path
|
|
self.__db_connect()
|
|
|
|
def __db_connect(self):
|
|
logging.info('[SnoopR] Setting up database connection...')
|
|
self.__connection = sqlite3.connect(self.__path, check_same_thread=False)
|
|
cursor = self.__connection.cursor()
|
|
|
|
cursor.execute('''
|
|
CREATE TABLE IF NOT EXISTS sessions (
|
|
id INTEGER PRIMARY KEY AUTOINCREMENT,
|
|
created_at TEXT DEFAULT CURRENT_TIMESTAMP
|
|
)
|
|
''')
|
|
cursor.execute('''
|
|
CREATE TABLE IF NOT EXISTS networks (
|
|
id INTEGER PRIMARY KEY AUTOINCREMENT,
|
|
mac TEXT NOT NULL UNIQUE,
|
|
type TEXT NOT NULL,
|
|
name TEXT,
|
|
device_type TEXT NOT NULL,
|
|
is_snooper INTEGER DEFAULT 0
|
|
)
|
|
''')
|
|
cursor.execute('''
|
|
CREATE TABLE IF NOT EXISTS detections (
|
|
id INTEGER PRIMARY KEY AUTOINCREMENT,
|
|
session_id INTEGER NOT NULL,
|
|
network_id INTEGER NOT NULL,
|
|
encryption TEXT,
|
|
signal_strength INTEGER,
|
|
latitude TEXT,
|
|
longitude TEXT,
|
|
channel INTEGER,
|
|
auth_mode TEXT,
|
|
timestamp TEXT DEFAULT CURRENT_TIMESTAMP,
|
|
FOREIGN KEY(session_id) REFERENCES sessions(id),
|
|
FOREIGN KEY(network_id) REFERENCES networks(id)
|
|
)
|
|
''')
|
|
cursor.execute('CREATE INDEX IF NOT EXISTS idx_detections_network_id ON detections(network_id)')
|
|
cursor.execute('CREATE INDEX IF NOT EXISTS idx_networks_mac ON networks(mac)')
|
|
cursor.execute('CREATE INDEX IF NOT EXISTS idx_detections_timestamp ON detections(timestamp)')
|
|
|
|
cursor.execute("PRAGMA table_info(detections)")
|
|
columns = [column[1] for column in cursor.fetchall()]
|
|
if 'channel' not in columns:
|
|
cursor.execute("ALTER TABLE detections ADD COLUMN channel INTEGER")
|
|
logging.info('[SnoopR] Added "channel" column to detections table')
|
|
if 'auth_mode' not in columns:
|
|
cursor.execute("ALTER TABLE detections ADD COLUMN auth_mode TEXT")
|
|
logging.info('[SnoopR] Added "auth_mode" column to detections table')
|
|
|
|
cursor.close()
|
|
self.__connection.commit()
|
|
logging.info('[SnoopR] Successfully connected to db')
|
|
|
|
def disconnect(self):
|
|
self.__connection.commit()
|
|
self.__connection.close()
|
|
logging.info('[SnoopR] Closed db connection')
|
|
|
|
def new_session(self):
|
|
cursor = self.__connection.cursor()
|
|
cursor.execute('INSERT INTO sessions DEFAULT VALUES')
|
|
session_id = cursor.lastrowid
|
|
cursor.close()
|
|
self.__connection.commit()
|
|
return session_id
|
|
|
|
def add_detection(self, session_id, mac, type_, name, device_type, encryption, signal_strength, latitude, longitude, channel, auth_mode):
|
|
cursor = self.__connection.cursor()
|
|
try:
|
|
cursor.execute('SELECT id FROM networks WHERE mac = ? AND device_type = ?', (mac, device_type))
|
|
result = cursor.fetchone()
|
|
if result:
|
|
network_id = result[0]
|
|
else:
|
|
cursor.execute('INSERT INTO networks (mac, type, name, device_type) VALUES (?, ?, ?, ?)', (mac, type_, name, device_type))
|
|
network_id = cursor.lastrowid
|
|
cursor.execute('''
|
|
INSERT INTO detections (session_id, network_id, encryption, signal_strength, latitude, longitude, channel, auth_mode)
|
|
VALUES (?, ?, ?, ?, ?, ?, ?, ?)
|
|
''', (session_id, network_id, encryption, signal_strength, latitude, longitude, channel, auth_mode))
|
|
self.__connection.commit()
|
|
logging.debug(f'[SnoopR] Added detection: {mac} ({device_type}) at {latitude},{longitude}')
|
|
return network_id
|
|
except Exception as e:
|
|
logging.error(f'[SnoopR] Database error: {e}')
|
|
raise
|
|
finally:
|
|
cursor.close()
|
|
|
|
def add_detection_batch(self, detections):
|
|
cursor = self.__connection.cursor()
|
|
try:
|
|
for mac, type_, name, device_type, encryption, signal_strength, latitude, longitude, channel, auth_mode, session_id in detections:
|
|
cursor.execute('SELECT id FROM networks WHERE mac = ? AND device_type = ?', (mac, device_type))
|
|
result = cursor.fetchone()
|
|
if result:
|
|
network_id = result[0]
|
|
else:
|
|
cursor.execute('INSERT INTO networks (mac, type, name, device_type) VALUES (?, ?, ?, ?)', (mac, type_, name, device_type))
|
|
network_id = cursor.lastrowid
|
|
cursor.execute('''
|
|
INSERT INTO detections (session_id, network_id, encryption, signal_strength, latitude, longitude, channel, auth_mode)
|
|
VALUES (?, ?, ?, ?, ?, ?, ?, ?)
|
|
''', (session_id, network_id, encryption, signal_strength, latitude, longitude, channel, auth_mode))
|
|
logging.debug(f'[SnoopR] Batch added: {mac} ({device_type}) at {latitude},{longitude}')
|
|
self.__connection.commit()
|
|
except Exception as e:
|
|
logging.error(f'[SnoopR] Batch database error: {e}')
|
|
raise
|
|
finally:
|
|
cursor.close()
|
|
|
|
def get_network_details(self, mac, device_type):
|
|
cursor = self.__connection.cursor()
|
|
try:
|
|
cursor.execute('''
|
|
SELECT n.mac, n.type, n.name, n.device_type, n.is_snooper,
|
|
COUNT(DISTINCT d.session_id) as sessions_count,
|
|
MIN(d.timestamp) as first_seen, MAX(d.timestamp) as last_seen
|
|
FROM networks n
|
|
LEFT JOIN detections d ON n.id = d.network_id
|
|
WHERE n.mac = ? AND n.device_type = ?
|
|
GROUP BY n.id
|
|
''', (mac, device_type))
|
|
network = cursor.fetchone()
|
|
if not network:
|
|
return None
|
|
cursor.execute('''
|
|
SELECT latitude, longitude, timestamp, signal_strength
|
|
FROM detections d
|
|
JOIN networks n ON d.network_id = n.id
|
|
WHERE n.mac = ? AND n.device_type = ?
|
|
ORDER BY d.timestamp
|
|
''', (mac, device_type))
|
|
detections = cursor.fetchall()
|
|
result = {
|
|
'mac': network[0], 'type': network[1], 'name': network[2], 'device_type': network[3],
|
|
'is_snooper': bool(network[4]), 'sessions_count': network[5],
|
|
'first_seen': network[6], 'last_seen': network[7],
|
|
'detections': [{'latitude': float(d[0]) if d[0] != '-' else None, 'longitude': float(d[1]) if d[1] != '-' else None,
|
|
'timestamp': d[2], 'signal_strength': d[3]} for d in detections]
|
|
}
|
|
return result
|
|
finally:
|
|
cursor.close()
|
|
|
|
def get_all_networks(self, sort_by=None, filter_by=None):
|
|
cursor = self.__connection.cursor()
|
|
try:
|
|
query = '''
|
|
SELECT n.mac, n.type, n.name, n.device_type, MIN(d.timestamp) as first_seen, MIN(d.session_id) as first_session,
|
|
MAX(d.timestamp) as last_seen, MAX(d.session_id) as last_session, COUNT(DISTINCT d.session_id) as sessions_count,
|
|
d.latitude, d.longitude, n.is_snooper
|
|
FROM networks n
|
|
JOIN detections d ON n.id = d.network_id
|
|
WHERE 1=1
|
|
'''
|
|
if filter_by == 'snoopers':
|
|
query += ' AND n.is_snooper = 1'
|
|
elif filter_by == 'bluetooth':
|
|
query += ' AND n.device_type = "bluetooth"'
|
|
elif filter_by == 'aircraft':
|
|
query += ' AND n.device_type = "aircraft"'
|
|
query += ' GROUP BY n.id, n.mac, n.type, n.name, n.device_type'
|
|
if sort_by == 'device_type':
|
|
query += ' ORDER BY n.device_type'
|
|
elif sort_by == 'is_snooper':
|
|
query += ' ORDER BY n.is_snooper DESC'
|
|
cursor.execute(query)
|
|
rows = cursor.fetchall()
|
|
networks = []
|
|
for row in rows:
|
|
mac, type_, name, device_type, first_seen, first_session, last_seen, last_session, sessions_count, latitude, longitude, is_snooper = row
|
|
lat = float(latitude) if latitude and latitude != '-' else None
|
|
lon = float(longitude) if longitude and longitude != '-' else None
|
|
networks.append({
|
|
'mac': mac, 'type': type_, 'name': name, 'device_type': device_type,
|
|
'first_seen': first_seen, 'first_session': first_session,
|
|
'last_seen': last_seen, 'last_session': last_session,
|
|
'sessions_count': sessions_count,
|
|
'latitude': lat,
|
|
'longitude': lon,
|
|
'is_snooper': bool(is_snooper)
|
|
})
|
|
logging.debug(f'[SnoopR] Web UI networks: {len(networks)} entries, first: {networks[0] if networks else "None"}')
|
|
return networks
|
|
except Exception as e:
|
|
logging.error(f'[SnoopR] get_all_networks error: {e}')
|
|
return []
|
|
finally:
|
|
cursor.close()
|
|
|
|
def network_count(self, device_type=None):
|
|
cursor = self.__connection.cursor()
|
|
try:
|
|
if device_type:
|
|
cursor.execute('SELECT COUNT(DISTINCT mac) FROM networks WHERE device_type = ?', (device_type,))
|
|
else:
|
|
cursor.execute('SELECT COUNT(DISTINCT mac) FROM networks')
|
|
count = cursor.fetchone()[0]
|
|
return count
|
|
finally:
|
|
cursor.close()
|
|
|
|
def snooper_count(self, device_type=None):
|
|
cursor = self.__connection.cursor()
|
|
try:
|
|
if device_type:
|
|
cursor.execute('SELECT COUNT(*) FROM networks WHERE is_snooper = 1 AND device_type = ?', (device_type,))
|
|
else:
|
|
cursor.execute('SELECT COUNT(*) FROM networks WHERE is_snooper = 1')
|
|
count = cursor.fetchone()[0]
|
|
return count
|
|
finally:
|
|
cursor.close()
|
|
|
|
def update_snooper_status(self, mac, device_type, is_snooper):
|
|
cursor = self.__connection.cursor()
|
|
try:
|
|
cursor.execute('UPDATE networks SET is_snooper = ? WHERE mac = ? AND device_type = ?', (is_snooper, mac, device_type))
|
|
self.__connection.commit()
|
|
finally:
|
|
cursor.close()
|
|
|
|
def prune_old_data(self, days):
|
|
cursor = self.__connection.cursor()
|
|
try:
|
|
cutoff_date = (datetime.now() - timedelta(days=days)).strftime('%Y-%m-%d %H:%M:%S')
|
|
cursor.execute('DELETE FROM detections WHERE timestamp < ?', (cutoff_date,))
|
|
self.__connection.commit()
|
|
logging.info(f'[SnoopR] Pruned data older than {days} days')
|
|
finally:
|
|
cursor.close()
|
|
|
|
class MeshNetwork:
|
|
def __init__(self, host_ip, port, peers):
|
|
self.host_ip = host_ip
|
|
self.port = port
|
|
self.peers = peers
|
|
self.socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
|
self.socket.bind((host_ip, port))
|
|
self.socket.setblocking(False)
|
|
|
|
def broadcast_detection(self, detection):
|
|
data = json.dumps(detection).encode('utf-8')
|
|
for peer in self.peers:
|
|
try:
|
|
self.socket.sendto(data, (peer, self.port))
|
|
except Exception as e:
|
|
logging.error(f'[SnoopR] Failed to send to {peer}: {e}')
|
|
|
|
def receive_detections(self, db):
|
|
ready, _, _ = select.select([self.socket], [], [], 0.1)
|
|
if ready:
|
|
data, _ = self.socket.recvfrom(4096)
|
|
detection = json.loads(data.decode('utf-8'))
|
|
db.add_detection_batch([(
|
|
detection['mac'], detection['type'], detection['name'], detection['device_type'],
|
|
detection['encryption'], detection['signal_strength'], detection['latitude'],
|
|
detection['longitude'], detection['channel'], detection['auth_mode'], detection['session_id']
|
|
)])
|
|
logging.debug(f'[SnoopR] Received mesh detection: {detection["mac"]}')
|
|
|
|
def close(self):
|
|
self.socket.close()
|
|
|
|
class SnoopR(plugins.Plugin):
|
|
__author__ = 'AlienMajik'
|
|
__version__ = '2.0.1'
|
|
__license__ = 'GPL3'
|
|
__description__ = 'Enhanced wardriving plugin with robust GPS/Bluetooth/Wi-Fi and SkyHigh integration, including aircraft tracking.'
|
|
|
|
DEFAULT_PATH = '/root/snoopr'
|
|
DATABASE_NAME = 'snoopr.db'
|
|
|
|
def __init__(self):
|
|
self.__db = None
|
|
self.ready = False
|
|
self.__gps_available = True
|
|
self.__lock = Lock()
|
|
self.__last_gps = {'latitude': '-', 'longitude': '-', 'altitude': '-'}
|
|
self.__last_valid_gps = None
|
|
self.__session_id = None
|
|
self.__bluetooth_enabled = False
|
|
self.last_scan_time = 0
|
|
self.__whitelist = []
|
|
self.prune_days = 30
|
|
self.__mesh = None
|
|
self.__ap_batch = []
|
|
self.__recent_aircraft = {}
|
|
|
|
def on_loaded(self):
|
|
logging.info('[SnoopR] Plugin loaded.')
|
|
self.__path = self.options.get('path', self.DEFAULT_PATH)
|
|
self.__ui_enabled = self.options.get('ui', {}).get('enabled', True)
|
|
self.__gps_config = {'method': self.options.get('gps', {}).get('method', 'bettercap')}
|
|
self.movement_threshold = self.options.get('movement_threshold', 0.1)
|
|
self.time_threshold_minutes = self.options.get('time_threshold_minutes', 5)
|
|
self.__bluetooth_enabled = self.options.get('bluetooth_enabled', False)
|
|
self.timer = self.options.get('timer', 45)
|
|
self.__whitelist = self.options.get('whitelist', [])
|
|
self.prune_days = self.options.get('prune_days', 30)
|
|
self.mesh_enabled = self.options.get('mesh_enabled', False)
|
|
self.mesh_host_ip = self.options.get('mesh_host_ip', '192.168.1.1')
|
|
self.mesh_port = self.options.get('mesh_port', 9999)
|
|
self.mesh_peers = self.options.get('mesh_peers', [])
|
|
self.aircraft_file = self.options.get('aircraft_file', '/root/handshakes/skyhigh_aircraft.json')
|
|
self.log_without_gps = self.options.get('log_without_gps', True)
|
|
|
|
if not os.path.exists(self.__path):
|
|
os.makedirs(self.__path)
|
|
self.__db = Database(os.path.join(self.__path, self.DATABASE_NAME))
|
|
self.__session_id = self.__db.new_session()
|
|
self.__db.prune_old_data(self.prune_days)
|
|
if self.mesh_enabled:
|
|
try:
|
|
self.__mesh = MeshNetwork(self.mesh_host_ip, self.mesh_port, self.mesh_peers)
|
|
except Exception as e:
|
|
logging.error(f'[SnoopR] Mesh setup failed: {e}')
|
|
self.__mesh = None
|
|
self.ready = True
|
|
|
|
def on_ui_setup(self, ui):
|
|
if self.__ui_enabled:
|
|
ui.add_element('snoopr_wifi_networks', LabeledValue(
|
|
color=BLACK, label='WiFi Nets:', value='0', position=(7, 95),
|
|
label_font=fonts.Small, text_font=fonts.Small))
|
|
ui.add_element('snoopr_wifi_snoopers', LabeledValue(
|
|
color=BLACK, label='WiFi Snoopers:', value='0', position=(7, 105),
|
|
label_font=fonts.Small, text_font=fonts.Small))
|
|
ui.add_element('snoopr_last_scan', LabeledValue(
|
|
color=BLACK, label='Last Scan:', value='N/A', position=(7, 135),
|
|
label_font=fonts.Small, text_font=fonts.Small))
|
|
if self.__bluetooth_enabled:
|
|
ui.add_element('snoopr_bt_networks', LabeledValue(
|
|
color=BLACK, label='BT Nets:', value='0', position=(7, 115),
|
|
label_font=fonts.Small, text_font=fonts.Small))
|
|
ui.add_element('snoopr_bt_snoopers', LabeledValue(
|
|
color=BLACK, label='BT Snoopers:', value='0', position=(7, 125),
|
|
label_font=fonts.Small, text_font=fonts.Small))
|
|
|
|
def on_ui_update(self, ui):
|
|
if self.__ui_enabled and self.ready:
|
|
current_time = time.time()
|
|
if current_time - self.last_scan_time >= self.timer:
|
|
self.last_scan_time = current_time
|
|
Thread(target=self.on_bluetooth_scan).start()
|
|
if self.mesh_enabled and self.__mesh:
|
|
self.__mesh.receive_detections(self.__db)
|
|
if os.path.exists(self.aircraft_file):
|
|
try:
|
|
with open(self.aircraft_file, 'r') as f:
|
|
aircraft = json.load(f)
|
|
if isinstance(aircraft, dict):
|
|
aircraft_data = list(aircraft.values())
|
|
logging.debug(f'[SnoopR] Aircraft loaded: {len(aircraft_data)} entries, first: {aircraft_data[0] if aircraft_data else "None"}')
|
|
elif not isinstance(aircraft, list):
|
|
logging.warning(f"[SnoopR] Invalid aircraft file format: {type(aircraft)}")
|
|
aircraft_data = []
|
|
else:
|
|
aircraft_data = aircraft
|
|
for plane in aircraft_data:
|
|
if not isinstance(plane, dict):
|
|
logging.warning(f"[SnoopR] Invalid aircraft entry: {plane}")
|
|
continue
|
|
icao = plane.get('icao24', 'UNKNOWN')
|
|
callsign = plane.get('callsign', 'UNKNOWN').strip()
|
|
lat = plane.get('latitude')
|
|
lon = plane.get('longitude')
|
|
is_drone = plane.get('is_drone', False)
|
|
altitude = plane.get('alt', 10000)
|
|
if icao not in self.__recent_aircraft:
|
|
self.__recent_aircraft[icao] = {'last_seen': current_time, 'positions': [], 'snooper': is_drone}
|
|
self.__recent_aircraft[icao]['positions'].append((lat, lon, current_time, altitude))
|
|
self.__recent_aircraft[icao]['last_seen'] = current_time
|
|
|
|
# Log aircraft detection to database
|
|
if lat not in (None, 'N/A') and lon not in (None, 'N/A'):
|
|
try:
|
|
network_id = self.__db.add_detection(
|
|
self.__session_id, icao, 'aircraft', callsign, 'aircraft', '', 0,
|
|
str(lat), str(lon), 0, ''
|
|
)
|
|
self.check_aircraft_snooper_status(icao, 'aircraft')
|
|
except Exception as e:
|
|
logging.error(f'[SnoopR] Failed to log aircraft detection: {e}')
|
|
|
|
# Proximity alert
|
|
if self.__last_gps['latitude'] != '-' and lat not in (None, 'N/A') and lon not in (None, 'N/A'):
|
|
try:
|
|
dist = self.__calculate_distance(
|
|
float(self.__last_gps['latitude']), float(self.__last_gps['longitude']),
|
|
float(lat), float(lon)
|
|
)
|
|
if dist < 5 and (icao not in self.__recent_aircraft or current_time - self.__recent_aircraft[icao]['last_seen'] > 60):
|
|
alert_type = 'Drone' if is_drone else 'Aircraft'
|
|
snooper_flag = 'Snooper ' if self.__recent_aircraft[icao]['snooper'] else ''
|
|
logging.critical(f"[SnoopR] {snooper_flag}{alert_type} {icao} ({callsign}) detected {dist:.2f} miles away!")
|
|
self.__notify(f"{snooper_flag}{alert_type} {icao} ({callsign}) {dist:.2f}mi away!")
|
|
self.__recent_aircraft[icao]['last_seen'] = current_time
|
|
except (ValueError, TypeError) as e:
|
|
logging.warning(f"[SnoopR] Invalid aircraft coords: {e}")
|
|
self.__recent_aircraft = {k: v for k, v in self.__recent_aircraft.items() if current_time - v['last_seen'] < 3600}
|
|
except Exception as e:
|
|
logging.error(f"[SnoopR] Failed to process aircraft file: {e}")
|
|
ui.set('snoopr_wifi_networks', str(self.__db.network_count('wifi')))
|
|
ui.set('snoopr_wifi_snoopers', str(self.__db.snooper_count('wifi')))
|
|
if self.last_scan_time == 0:
|
|
ui.set('snoopr_last_scan', 'N/A')
|
|
else:
|
|
ui.set('snoopr_last_scan', datetime.fromtimestamp(self.last_scan_time).strftime('%H:%M:%S'))
|
|
if self.__bluetooth_enabled:
|
|
ui.set('snoopr_bt_networks', str(self.__db.network_count('bluetooth')))
|
|
ui.set('snoopr_bt_snoopers', str(self.__db.snooper_count('bluetooth')))
|
|
|
|
def on_unload(self, ui):
|
|
if self.__ui_enabled:
|
|
with ui._lock:
|
|
ui.remove_element('snoopr_wifi_networks')
|
|
ui.remove_element('snoopr_wifi_snoopers')
|
|
ui.remove_element('snoopr_last_scan')
|
|
if self.__bluetooth_enabled:
|
|
ui.remove_element('snoopr_bt_networks')
|
|
ui.remove_element('snoopr_bt_snoopers')
|
|
self.__db.disconnect()
|
|
if self.mesh_enabled and self.__mesh:
|
|
self.__mesh.close()
|
|
logging.info('[SnoopR] Plugin unloaded')
|
|
|
|
def __get_gps(self, agent):
|
|
for attempt in range(5):
|
|
try:
|
|
time.sleep(5) # Increased delay for bettercap API
|
|
info = agent.session()
|
|
gps_data = info.get('gps', None)
|
|
if gps_data and gps_data.get('Latitude') and gps_data.get('Longitude'):
|
|
logging.debug(f'[SnoopR] Bettercap GPS acquired: {gps_data["Latitude"]}, {gps_data["Longitude"]}')
|
|
self.__last_valid_gps = gps_data
|
|
return gps_data
|
|
except Exception as e:
|
|
logging.warning(f'[SnoopR] Bettercap GPS failed (attempt {attempt + 1}/5): {e}')
|
|
logging.warning('[SnoopR] No GPS data after retries')
|
|
return self.__last_valid_gps if self.__last_valid_gps else None
|
|
|
|
def on_unfiltered_ap_list(self, agent, aps):
|
|
if not self.ready:
|
|
return
|
|
with self.__lock:
|
|
gps_data = self.__get_gps(agent)
|
|
if gps_data and all([gps_data['Latitude'], gps_data['Longitude']]):
|
|
self.__last_gps = {
|
|
'latitude': gps_data['Latitude'],
|
|
'longitude': gps_data['Longitude'],
|
|
'altitude': gps_data['Altitude'] or '-'
|
|
}
|
|
coordinates = {'latitude': str(gps_data['Latitude']), 'longitude': str(gps_data['Longitude'])}
|
|
else:
|
|
coordinates = {'latitude': '-', 'longitude': '-'}
|
|
self.__ap_batch = []
|
|
for ap in aps:
|
|
mac = ap['mac']
|
|
ssid = ap['hostname'] if ap['hostname'] != '<hidden>' else ''
|
|
if ssid in self.__whitelist:
|
|
logging.debug(f'[SnoopR] Skipping whitelisted AP: {ssid}')
|
|
continue
|
|
encryption = f"{ap['encryption']}{ap.get('cipher', '')}{ap.get('authentication', '')}"
|
|
rssi = ap['rssi']
|
|
channel = ap.get('channel', 0)
|
|
auth_mode = ap.get('authentication', '')
|
|
self.__ap_batch.append((
|
|
mac, 'wi-fi ap', ssid, 'wifi', encryption, rssi,
|
|
coordinates['latitude'], coordinates['longitude'], channel, auth_mode, self.__session_id
|
|
))
|
|
logging.info(f'[SnoopR] Detected Wi-Fi AP: {mac} ({ssid}) at {coordinates["latitude"]},{coordinates["longitude"]}')
|
|
self.check_and_update_snooper_status(mac, 'wifi')
|
|
if self.__ap_batch:
|
|
try:
|
|
self.__db.add_detection_batch(self.__ap_batch)
|
|
logging.info(f'[SnoopR] Saved {len(self.__ap_batch)} Wi-Fi detections')
|
|
if self.mesh_enabled and self.__mesh:
|
|
for detection in self.__ap_batch:
|
|
self.__mesh.broadcast_detection({
|
|
'mac': detection[0], 'type': detection[1], 'name': detection[2],
|
|
'device_type': detection[3], 'encryption': detection[4], 'signal_strength': detection[5],
|
|
'latitude': detection[6], 'longitude': detection[7], 'channel': detection[8],
|
|
'auth_mode': detection[9], 'session_id': detection[10]
|
|
})
|
|
except Exception as e:
|
|
logging.error(f'[SnoopR] Failed to save Wi-Fi batch: {e}')
|
|
|
|
def on_bluetooth_scan(self):
|
|
if not self.ready or not self.__bluetooth_enabled:
|
|
logging.debug('[SnoopR] Bluetooth scan skipped: not ready or disabled')
|
|
return
|
|
with self.__lock:
|
|
gps_data = self.__get_gps(None)
|
|
if gps_data and all([gps_data['Latitude'], gps_data['Longitude']]):
|
|
self.__last_gps = {
|
|
'latitude': gps_data['Latitude'],
|
|
'longitude': gps_data['Longitude'],
|
|
'altitude': gps_data['Altitude'] or '-'
|
|
}
|
|
coordinates = {'latitude': str(gps_data['Latitude']), 'longitude': str(gps_data['Longitude'])}
|
|
else:
|
|
if not self.log_without_gps:
|
|
logging.warning("[SnoopR] No valid GPS data available, skipping Bluetooth scan.")
|
|
return
|
|
coordinates = {'latitude': '-', 'longitude': '-'}
|
|
for attempt in range(3):
|
|
try:
|
|
logging.debug(f'[SnoopR] Attempting Bluetooth scan (attempt {attempt + 1}/3)')
|
|
cmd_inq = "hcitool inq --flush"
|
|
inq_output = subprocess.check_output(cmd_inq.split(), stderr=subprocess.STDOUT).decode().splitlines()
|
|
for line in inq_output[1:]:
|
|
fields = line.split()
|
|
if len(fields) < 1:
|
|
continue
|
|
mac_address = fields[0]
|
|
name = self.get_device_name(mac_address)
|
|
if name in self.__whitelist:
|
|
logging.debug(f'[SnoopR] Skipping whitelisted Bluetooth: {name}')
|
|
continue
|
|
network_id = self.__db.add_detection(
|
|
self.__session_id, mac_address, 'bluetooth', name, 'bluetooth', '', 0,
|
|
coordinates['latitude'], coordinates['longitude'], 0, ''
|
|
)
|
|
self.check_and_update_snooper_status(mac_address, 'bluetooth')
|
|
logging.info(f'[SnoopR] Logged Bluetooth device: {mac_address} ({name}) at {coordinates["latitude"]},{coordinates["longitude"]}')
|
|
break # Exit loop on success
|
|
except subprocess.CalledProcessError as e:
|
|
logging.error(f"[SnoopR] hcitool scan failed (attempt {attempt + 1}/3): {e.output.decode()}")
|
|
if attempt < 2:
|
|
time.sleep(1)
|
|
continue
|
|
logging.error("[SnoopR] Bluetooth scan failed after 3 attempts")
|
|
self.__notify("Bluetooth scan failed!")
|
|
|
|
def get_device_name(self, mac_address):
|
|
for attempt in range(3):
|
|
try:
|
|
cmd_name = f"hcitool name {mac_address}"
|
|
name_output = subprocess.check_output(cmd_name.split(), stderr=subprocess.STDOUT).decode().strip()
|
|
return name_output if name_output else 'Unknown'
|
|
except subprocess.CalledProcessError:
|
|
if attempt < 2:
|
|
time.sleep(1)
|
|
continue
|
|
logging.warning(f"[SnoopR] Failed to get name for {mac_address} after 3 attempts")
|
|
return 'Unknown'
|
|
|
|
def check_and_update_snooper_status(self, mac, device_type):
|
|
cursor = self.__db._Database__connection.cursor()
|
|
try:
|
|
cursor.execute('''
|
|
SELECT d.latitude, d.longitude, d.timestamp
|
|
FROM detections d
|
|
JOIN networks n ON d.network_id = n.id
|
|
WHERE n.mac = ? AND n.device_type = ?
|
|
ORDER BY d.timestamp
|
|
''', (mac, device_type))
|
|
rows = cursor.fetchall()
|
|
cursor.execute('SELECT COUNT(DISTINCT session_id) FROM detections d JOIN networks n ON d.network_id = n.id WHERE n.mac = ? AND n.device_type = ?', (mac, device_type))
|
|
session_count = cursor.fetchone()[0]
|
|
if len(rows) < 3 or session_count < 2:
|
|
return
|
|
is_snooper = False
|
|
for i in range(1, len(rows)):
|
|
lat1, lon1, t1 = rows[i-1]
|
|
lat2, lon2, t2 = rows[i]
|
|
if lat1 == '-' or lon1 == '-' or lat2 == '-' or lon2 == '-':
|
|
continue
|
|
lat1, lon1, lat2, lon2 = map(float, [lat1, lon1, lat2, lon2])
|
|
t1 = datetime.strptime(t1, '%Y-%m-%d %H:%M:%S')
|
|
t2 = datetime.strptime(t2, '%Y-%m-%d %H:%M:%S')
|
|
time_diff = (t2 - t1).total_seconds() / 60.0
|
|
if time_diff > self.time_threshold_minutes:
|
|
dist = self.__calculate_distance(lat1, lon1, lat2, lon2)
|
|
velocity = (dist * 1609.34) / (time_diff * 60)
|
|
if dist > self.movement_threshold or velocity > 1.5:
|
|
is_snooper = True
|
|
break
|
|
self.__db.update_snooper_status(mac, device_type, int(is_snooper))
|
|
finally:
|
|
cursor.close()
|
|
|
|
def check_aircraft_snooper_status(self, icao, device_type):
|
|
cursor = self.__db._Database__connection.cursor()
|
|
try:
|
|
cursor.execute('''
|
|
SELECT d.latitude, d.longitude, d.timestamp
|
|
FROM detections d
|
|
JOIN networks n ON d.network_id = n.id
|
|
WHERE n.mac = ? AND n.device_type = ?
|
|
ORDER BY d.timestamp
|
|
''', (icao, device_type))
|
|
rows = cursor.fetchall()
|
|
cursor.execute('SELECT COUNT(DISTINCT session_id) FROM detections d JOIN networks n ON d.network_id = n.id WHERE n.mac = ? AND n.device_type = ?', (icao, device_type))
|
|
session_count = cursor.fetchone()[0]
|
|
if len(rows) < 3 or session_count < 2:
|
|
return
|
|
is_snooper = False
|
|
for i in range(1, len(rows)):
|
|
lat1, lon1, t1 = rows[i-1]
|
|
lat2, lon2, t2 = rows[i]
|
|
if lat1 == '-' or lon1 == '-' or lat2 == '-' or lon2 == '-':
|
|
continue
|
|
lat1, lon1, lat2, lon2 = map(float, [lat1, lon1, lat2, lon2])
|
|
t1 = datetime.strptime(t1, '%Y-%m-%d %H:%M:%S')
|
|
t2 = datetime.strptime(t2, '%Y-%m-%d %H:%M:%S')
|
|
time_diff = (t2 - t1).total_seconds() / 3600.0 # Hours for aircraft
|
|
if time_diff > self.time_threshold_minutes / 60.0:
|
|
dist = self.__calculate_distance(lat1, lon1, lat2, lon2)
|
|
velocity = (dist * 1609.34) / (time_diff * 3600) # mph
|
|
if dist < 5 and velocity < 50: # Loitering or slow-moving
|
|
is_snooper = True
|
|
break
|
|
self.__db.update_snooper_status(icao, device_type, int(is_snooper))
|
|
finally:
|
|
cursor.close()
|
|
|
|
def __calculate_distance(self, lat1, lon1, lat2, lon2):
|
|
R = 3958.8
|
|
lat1, lon1, lat2, lon2 = map(radians, [lat1, lon1, lat2, lon2])
|
|
dlat = lat2 - lat1
|
|
dlon = lon2 - lon1
|
|
a = sin(dlat/2)**2 + cos(lat1) * cos(lat2) * sin(dlon/2)**2
|
|
c = 2 * atan2(sqrt(a), sqrt(1-a))
|
|
return R * c
|
|
|
|
def __notify(self, message):
|
|
logging.info(f"[SnoopR] Notification: {message}")
|
|
|
|
def on_webhook(self, path, request):
|
|
if request.method == 'GET':
|
|
sort_by = request.args.get('sort_by', None)
|
|
filter_by = request.args.get('filter_by', None)
|
|
if path == 'network':
|
|
mac = request.args.get('mac')
|
|
device_type = request.args.get('device_type')
|
|
if mac and device_type:
|
|
details = self.__db.get_network_details(mac, device_type)
|
|
return jsonify(details) if details else ("Not found.", 404)
|
|
if path == '/' or not path:
|
|
all_networks = self.__db.get_all_networks(sort_by=sort_by, filter_by=filter_by)
|
|
snoopers = [n for n in all_networks if n['is_snooper']]
|
|
center = [float(self.__last_gps['latitude']), float(self.__last_gps['longitude'])] if self.__last_gps['latitude'] != '-' else [37.7177, -122.4393]
|
|
|
|
# Add aircraft to map
|
|
aircraft_markers = []
|
|
if os.path.exists(self.aircraft_file):
|
|
try:
|
|
with open(self.aircraft_file, 'r') as f:
|
|
aircraft = json.load(f)
|
|
if isinstance(aircraft, dict):
|
|
aircraft_data = list(aircraft.values())
|
|
else:
|
|
aircraft_data = aircraft if isinstance(aircraft, list) else []
|
|
for plane in aircraft_data:
|
|
if plane.get('latitude') and plane.get('longitude'):
|
|
icao = plane.get('icao24', 'UNKNOWN')
|
|
is_snooper = self.__recent_aircraft.get(icao, {}).get('snooper', plane.get('is_drone', False))
|
|
aircraft_markers.append({
|
|
'mac': icao,
|
|
'type': 'aircraft',
|
|
'name': plane.get('callsign', 'UNKNOWN').strip(),
|
|
'device_type': 'aircraft',
|
|
'first_seen': datetime.now().strftime('%Y-%m-%d %H:%M:%S'),
|
|
'first_session': self.__session_id,
|
|
'last_seen': datetime.now().strftime('%Y-%m-%d %H:%M:%S'),
|
|
'last_session': self.__session_id,
|
|
'sessions_count': 1,
|
|
'latitude': float(plane['latitude']),
|
|
'longitude': float(plane['longitude']),
|
|
'is_snooper': is_snooper
|
|
})
|
|
except Exception as e:
|
|
logging.error(f'[SnoopR] Failed to load aircraft for map: {e}')
|
|
all_networks.extend(aircraft_markers)
|
|
|
|
logging.debug(f'[SnoopR] Web UI center: {center}, networks: {len(all_networks)}')
|
|
return render_template_string(HTML_PAGE, networks=all_networks, snoopers=snoopers, center=center, sort_by=sort_by, filter_by=filter_by)
|
|
return "Not found.", 404
|
|
|
|
HTML_PAGE = '''
|
|
<!DOCTYPE html>
|
|
<html lang="en">
|
|
<head>
|
|
<meta charset="UTF-8">
|
|
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
|
<title>SnoopR - Wardrived Networks & Aircraft</title>
|
|
<link rel="stylesheet" href="https://unpkg.com/leaflet@1.9.4/dist/leaflet.css" />
|
|
<style>
|
|
body { font-family: Arial, sans-serif; margin: 20px; }
|
|
table { width: 100%; border-collapse: collapse; }
|
|
th, td { padding: 8px; text-align: left; border-bottom: 1px solid #ddd; cursor: pointer; }
|
|
th { background-color: #f2f2f2; }
|
|
.snooper { background-color: #ffcccc; }
|
|
#map { height: 400px; margin-top: 20px; }
|
|
.filter-container { margin-bottom: 20px; }
|
|
.filter-btn { padding: 5px 10px; margin-right: 10px; cursor: pointer; }
|
|
.filter-btn.active { background-color: #4CAF50; color: white; }
|
|
#scroll-to-top-button, #scroll-to-bottom-button {
|
|
position: fixed;
|
|
left: 50%;
|
|
transform: translateX(-50%);
|
|
padding: 5px 10px;
|
|
background-color: #4CAF50;
|
|
color: white;
|
|
border: none;
|
|
cursor: pointer;
|
|
z-index: 1000;
|
|
}
|
|
#scroll-to-top-button { top: 10px; }
|
|
#scroll-to-bottom-button { bottom: 10px; }
|
|
</style>
|
|
</head>
|
|
<body>
|
|
<button id="scroll-to-top-button">Scroll to Top</button>
|
|
<h1>SnoopR - Wardrived Networks & Aircraft</h1>
|
|
<div class="filter-container">
|
|
<button class="filter-btn active" onclick="toggleFilter('all')">All</button>
|
|
<button class="filter-btn" onclick="toggleFilter('snoopers')">Snoopers</button>
|
|
<button class="filter-btn" onclick="toggleFilter('bluetooth')">Bluetooth</button>
|
|
<button class="filter-btn" onclick="toggleFilter('aircraft')">Aircraft</button>
|
|
</div>
|
|
<table>
|
|
<thead>
|
|
<tr>
|
|
<th><a href="?sort_by=device_type&filter_by={{ filter_by }}">Device Type</a></th>
|
|
<th>MAC/ICAO24</th>
|
|
<th>Type</th>
|
|
<th>Name/Callsign</th>
|
|
<th>First Seen</th>
|
|
<th>Last Seen</th>
|
|
<th># Sessions</th>
|
|
<th><a href="?sort_by=is_snooper&filter_by={{ filter_by }}">Snooper</a></th>
|
|
</tr>
|
|
</thead>
|
|
<tbody>
|
|
{% for network in networks %}
|
|
<tr onclick="panToNetwork({{ network.latitude | default(center[0]) }}, {{ network.longitude | default(center[1]) }})" class="{{ 'snooper' if network.is_snooper else '' }}">
|
|
<td>{{ network.device_type }}</td>
|
|
<td>{{ network.mac }}</td>
|
|
<td>{{ network.type }}</td>
|
|
<td>{{ network.name }}</td>
|
|
<td>{{ network.first_seen }}</td>
|
|
<td>{{ network.last_seen }}</td>
|
|
<td>{{ network.sessions_count }}</td>
|
|
<td>{{ 'Yes' if network.is_snooper else 'No' }}</td>
|
|
</tr>
|
|
{% endfor %}
|
|
</tbody>
|
|
</table>
|
|
<div id="map"></div>
|
|
<button id="scroll-to-bottom-button">Scroll to Bottom</button>
|
|
<script src="https://unpkg.com/leaflet@1.9.4/dist/leaflet.js"></script>
|
|
<script>
|
|
var networks = {{ networks | tojson }};
|
|
var center = {{ center | tojson }};
|
|
console.log('Networks:', networks);
|
|
console.log('Center:', center);
|
|
var map = L.map('map').setView(center, 13);
|
|
L.tileLayer('https://{s}.tile.openstreetmap.org/{z}/{x}/{y}.png', {
|
|
attribution: '© OpenStreetMap contributors'
|
|
}).addTo(map);
|
|
|
|
var markers = [];
|
|
networks.forEach(function(network) {
|
|
var lat = network.latitude !== null ? network.latitude : center[0];
|
|
var lon = network.longitude !== null ? network.longitude : center[1];
|
|
var isNoCoords = network.latitude === null || network.longitude === null;
|
|
var color = network.is_snooper ? 'red' : (network.device_type === 'aircraft' ? 'green' : (isNoCoords ? 'gray' : 'blue'));
|
|
var marker = L.circleMarker([lat, lon], {
|
|
color: color,
|
|
radius: network.device_type === 'aircraft' ? 8 : 5
|
|
}).bindPopup(
|
|
`<b>Device Type:</b> ${network.device_type}<br>
|
|
<b>${network.device_type === 'aircraft' ? 'ICAO24' : 'MAC'}:</b> ${network.mac}<br>
|
|
<b>${network.device_type === 'aircraft' ? 'Callsign' : 'Name'}:</b> ${network.name}<br>
|
|
<b>Snooper:</b> ${network.is_snooper ? 'Yes' : 'No'}<br>
|
|
<b>First Seen:</b> ${network.first_seen}<br>
|
|
<b>Last Seen:</b> ${network.last_seen}<br>
|
|
<b>Sessions:</b> ${network.sessions_count}<br>
|
|
<b>Coords:</b> ${isNoCoords ? 'Unknown (plotted at center)' : lat + ', ' + lon}`
|
|
);
|
|
markers.push({marker: marker, network: network});
|
|
marker.addTo(map);
|
|
});
|
|
|
|
function panToNetwork(lat, lon) {
|
|
if (lat && lon) {
|
|
map.panTo([lat, lon]);
|
|
}
|
|
}
|
|
|
|
document.getElementById('scroll-to-top-button').addEventListener('click', function() {
|
|
window.scrollTo({top: 0, behavior: 'smooth'});
|
|
});
|
|
|
|
document.getElementById('scroll-to-bottom-button').addEventListener('click', function() {
|
|
window.scrollTo({top: document.body.scrollHeight, behavior: 'smooth'});
|
|
});
|
|
|
|
var currentFilter = 'all';
|
|
function toggleFilter(filter) {
|
|
if (currentFilter === filter) return;
|
|
currentFilter = filter;
|
|
document.querySelectorAll('.filter-btn').forEach(btn => {
|
|
btn.classList.remove('active');
|
|
if (btn.textContent.toLowerCase().includes(filter)) {
|
|
btn.classList.add('active');
|
|
}
|
|
});
|
|
window.location.href = `?filter_by=${filter}&sort_by=${encodeURIComponent('{{ sort_by }}')}`;
|
|
}
|
|
|
|
var bounds = [];
|
|
networks.forEach(function(network) {
|
|
if (network.latitude !== null && network.longitude !== null) {
|
|
bounds.push([network.latitude, network.longitude]);
|
|
}
|
|
});
|
|
if (bounds.length > 0) {
|
|
map.fitBounds(bounds);
|
|
} else {
|
|
map.setView(center, 13);
|
|
}
|
|
</script>
|
|
</body>
|
|
</html>
|
|
'''
|